What is hacking?
Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. And although hacking may not always be for malicious purposes, currently most references to both hacking and hackers are characterized as illegal activity by cybercriminals, motivated by obtaining financial gain, by protesting, gathering information (espionage), and even just for the “fun” of the challenge.
Many think that the term “hacker” refers to some highly gifted self-taught or dishonest programmer who is adept at modifying hardware or software so that it can be used in ways other than those conceived by the original developers. But this is a limited view that does not encompass the wide range of reasons why someone starts hacking. (For a detailed analysis of hackers, read ” From Anonymity: Why Money, Power, and Ego Lead Hackers to Computer Crime ” by Wendy Zamora).
Hacking is usually technical in nature (such as creating malicious advertising that spreads malware in a haphazard attack that requires no user interaction). But hackers can also use psychology to trick the user into clicking a malicious attachment or providing their personal details. These tactics are known as ” social engineering.”
Uncovered 6 Ways To Hack An iPhone
A team of bug hunters working for Google uncovered the iPhone’s weakest point: the iMessage app.
The team, called Google Zero , claims that it found five errors in the messaging service that would make iPhone extremely vulnerable to a hacker.
In one case, researchers at the search giant (whose Android system is the main competition for Apple’s iOS) said the vulnerability was so serious that the only way to rescue an iPhone that had been attacked would be to delete all the data it had. Stored.
The teenage hacker who earns $ 100,000 a year working just 20 hours a week
Another flaw, they said, would allow copies of files to be made from a device without authorization from the owner.
Last week Apple corrected these errors, but researchers say they found a sixth flaw that has not been corrected with the latest operating system update.
“That is quite unusual,” said Professor Alan Woodward, a cybersecurity expert at the University of Surrey in the UK.
“The reputation of the Google Zero team is such that it is worth taking into account .”
The Argentine teenage millionaire hacker who made US $ 1 million discovering computer errors
The Zero project was established in July 2014 to discover cyber vulnerabilities that were going unnoticed.
On other occasions, Zero alerted Microsoft, Facebook and Samsung, among others, about problems with their code.
If hackers discover the bug that has not been fixed, they could crash an app or run their own commands on iPhones, iPads, and iPod Touch.
Apple has not commented on this specific problem, but has urged users to install iOS 12.4, the latest version of its operating system.
This update aims to fix other Google Zero findings, as well as a wider range of flaws and threats.
“Keeping your software up to date is one of the most important things you can do to keep your product safe ,” Apple said in a statement.
The 16-year-old student who lost large companies millions of dollars after being rejected in a computer course
The tech news site ZDnet, which was the first to report these flaws, noted that the level of detail shared by Google about the other bugs could be enough to allow hackers to try to exploit those weaknesses.
The site claims that users should download iOS 12.4 “without delay.”
Natalie Silvanovich, one of Google’s researchers, plans to share more details of her findings during the Black Hat computer security event , which will take place in August in Las Vegas.
According to the synopsis of his presentation, Silvanovich will also talk about possible failures of Apple’s visual voicemail service , which allows you to see a list of messages and choose which ones you want to listen to or delete.
It will also present possible weaknesses in the Apple mail app .
One of Apple’s security chiefs will also participate in this event, where he will offer a talk in which he promises to show “the behind the scenes of iOS and Mac security.”