![Default self created cybersecurity insiders image low res](https://www.cybersecurity-insiders.com/wp-content/uploads/Default-self-created-cybersecurity-insiders-image-low-res-696x397.jpg)
![Default self created cybersecurity insiders image low res](https://www.cybersecurity-insiders.com/wp-content/uploads/Default-self-created-cybersecurity-insiders-image-low-res-696x397.jpg)
This post was originally published by Juan Lugo.
Earlier this month, Natalie Silvanovich, a Google Project Zero researcher, presented multiple interaction-less bugs in Appleās iOS iMessage client during the Black Hat security conference in Las Vegas. Silvanovich asserts that these bugs can be used to interact with a userās device and exploit it. Although Apple has addressed the issue publically, the bugs have still not been patched. These bugs can be weaponized to infiltrate usersā data without having to click on a link or download a malicious file. There is a lot of focus on deploying cryptographic solutions to secure data but, it renders uselessly if there are bugs on the receiving end.Ā
Read more here:Ā https://www.bitglass.com/blog/bss-iphones-susceptible-to-a-hack-via-text
Photo:internetofbusiness.com