Alberta Mirror

Sunday, November 28, 2021

Apple accusing ‘hacker-for-hire company NSO that Canadian cyber watchdog Citizen Lab notified them regarding

Key takeaways: 

  • Pegasus spyware has been utilised to aim at Apple appliances.
  • Cybersecurity specialists state NSO is a serious threat, not the ‘lawful interception’ it alleges to be.

Apple products targeted by Pegasus spyware: 

Tech giant Apple declared Tuesday it is accusing Israel’s NSO Group, the world’s several notorious hacker-for-hire firms for building and trading software intended to split into their devices.

The tech giant stated in an accusation filed in federal court in California that NSO Group agents are “amoral 21st-century mercenaries who have created highly sophisticated cyber-surveillance machinery that invites routine and flagrant abuse.”

“State-sponsored actors like the NSO Group spend millions of dollars on sophisticated surveillance technologies without effective accountability. That needs to change,” stated Craig Federighi, Apple’s senior vice-president of software engineering. Source – cbc.ca

The progress by Apple appears after cybersecurity watchdog group Citizen Lab, at the University of Toronto, informed Apple of a vulnerability in its software that could grant a kind of spyware called Pegasus to spoil Apple devices without the user doing anything or understanding about it.

Read more: U.S. drugstore series held for use in Ohio opioid emergency, jury discovers

How Pegasus runs

Security researchers have discovered Pegasus being practised around the globe to burst into the phones of human rights activists, journalists and even members of the Catholic prelacy.

Pegasus infiltrates phones to clean up personal and location data and secretly checks the smartphone’s microphones and cameras. Researchers have discovered some instances of NSO Group tools utilising so-called “zero-click” deeds that affect targeted mobile phones without any user communication. Source – cbc.ca

Show More

Leave a Reply

Your email address will not be published. Required fields are marked *