The "most secure" iOS was also conquered, a new iPhone vulnerability was exposed, and Apple admitted that it could not be fixed

The "most secure" iOS was also conquered, a new iPhone vulnerability was exposed, and Apple admitted that it could not be fixed

Although Apple's technology is powerful, iOS still has some loopholes that can be exploited by people with ulterior motives. There are even some loopholes that Apple itself cannot solve.

Recently, CCTV Finance Channel broadcast a program called "Operating System Battle" which mentioned a security risk of iPhone. The report pointed out that an Israeli software monitoring company sold a spyware called "Pegasus" to some countries. This software can attack various operating systems. Even Apple, which is known as the "safest", is not immune.

According to foreign media, there are currently 50,000 numbers on Pegasus' monitoring list, covering mobile phone users in more than 50 countries. Among these 50,000 users, there are at least 14 heavyweights, including the President of France, the President of Iraq, the President of South Africa, the President of Pakistan, etc. Interestingly, after the French President learned about this, he specially changed his mobile phone and phone number.

So how powerful is this "Pegasus"? It is reported that after it invades the user's mobile phone, it can obtain all the user's information, including photos, videos, text messages, and emails. It can also record without your knowledge, turn on the camera and microphone, etc.

Apple also responded to this vulnerability, saying that it was helpless. However, Apple gave another explanation, saying that ordinary users don't need to worry because Pegasus will not attack ordinary users, mainly because ordinary users don't have any valuable information for attackers.

As the saying goes, there is only relative security, not absolute security. Even Apple is helpless against some vulnerabilities, which may affect Apple's security image in the minds of users. At least many bigwigs in the political and business circles should consider whose phone to use when changing their phones.

<<:  Should I be overly concerned about my iPhone's battery health? Not necessarily.

>>:  iOS15 Beta5 update, many new improvements, but not recommended

Recommend

How to conduct user behavior analysis? What is the value?

Many people may not know that the meaning of the ...

Uncle San's huge Qianchuan detailed gameplay course

First Course The latest core gameplay of Juzhi Qi...

Douyin e-commerce data analysis case

Douyin e-commerce , which is in its bonus period,...

Foreign trade tips | SNS marketing methods

Although social media tools vary and marketing me...

Bidding promotion: How do bidders optimize the average price of keywords?

Here, the editor has compiled a wave of common bi...

The core secrets of UBER's operating strategy (absolutely dry stuff)

Uber's approach is worth learning for the Don...

Spring Festival holiday arrangements for 12 app stores

360 Mobile Assistant Application & Game Revie...

4 key data of the top 10 short video applications!

Do you know which short video app is used the lon...

Himalaya product operation analysis

In my childhood memory, there was always a radio ...

Complete guide to Tik Tok operations and the law of attraction!

This article explains the operation of TikTok fro...

2022 new online super hit "Lao Tao Pinduoduo Operation Series Course"

2022 new online super hit "Lao Tao Pinduoduo...