iOS exploit chains discovered in the wild

A group of hackers have been using compromised websites to launch watering hole attacks against iPhone users who visit the websites. The attacks also use five different exploit chains and exploit 0-day vulnerabilities that don't require any user interaction.

Continue Reading iOS exploit chains discovered in the wild

Bluetooth BR/EDR supported devices vulnerable to cyber attacks

Security researchers have identified a security vulnerability related to encryption on Bluetooth BR/EDR connections. As a result, an unauthenticated attacker near the vulnerable device could exploit the issue and escalate privileges or steal information.

Continue Reading Bluetooth BR/EDR supported devices vulnerable to cyber attacks