Deutsch English Français Italiano |
<ut45bs$itts$1@paganini.bofh.team> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!2.eu.feeder.erje.net!3.eu.feeder.erje.net!feeder.erje.net!paganini.bofh.team!not-for-mail From: Sten deJoode <StendeJood@nospam.net> Newsgroups: misc.phone.mobile.iphone Subject: Re: Are iPhones subject to ransomware attacks? Date: Sat, 16 Mar 2024 09:03:56 -0400 Organization: To protect and to server Message-ID: <ut45bs$itts$1@paganini.bofh.team> References: <ut26gf$2e534$1@dont-email.me> <l5jvq8Fj8sdU1@mid.individual.net> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8bit Injection-Date: Sat, 16 Mar 2024 13:03:57 -0000 (UTC) Injection-Info: paganini.bofh.team; logging-data="620476"; posting-host="KwzIAAXG6Ff1eRCAVfbVhg.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A"; User-Agent: 40tude_Dialog/2.0.15.41 (Beta 38) Cancel-Lock: sha256:I0EmCA4iqiE0O+IdyXXFgj5KqzoUQ51gc1tVT2OwRBE= X-Notice: Filtered by postfilter v. 0.9.3 Bytes: 1552 Lines: 13 On 15 Mar 2024 22:18:48 GMT, Jolly Roger wrote: > To be successfully attacked by malware, a Mac user must interactively > download the malware to their computer That's dead wrong. There have been *plenty* of zero-day zero-click no-interaction holes in Apple's operating systems, Jolly Roger, where the user does nothing at all. Most of them appear to be in Apple's defective kernel & webkit though. But you can see the _exploited_ ones in this listing if you like: <https://www.cisa.gov/known-exploited-vulnerabilities-catalog>