Monday, 16 March 2020
On 00:08 by admin No comments
According to Macrumors news reports, the latest research shows that dozens of popular iOS application, without the user's consent, read the contents of the clipboard , which may contain sensitive information.
IT House was informed that Talal Haj Bakry and Tommy Mysk survey found that every time you open the application, many popular applications (such as TikTok, etc.) silently read all the text on the clipboard.
Study says multiple Apple iPhone apps monitor clipboard data, not even Mac
Starting with iOS 13.3, iOS and iPadOS applications have unlimited access to system-wide clipboard data. The text held in the clipboard may not matter, but it may also be highly sensitive data, such as passwords or financial information. Bakry and Mysk have previously investigated the potential security risks of this vulnerability, and they have discovered that clipboard data can reveal precise location information.
Also note that if Universal Clipboard is enabled, these applications can also access content copied on Mac.
IT House was informed that Talal Haj Bakry and Tommy Mysk survey found that every time you open the application, many popular applications (such as TikTok, etc.) silently read all the text on the clipboard.
Study says multiple Apple iPhone apps monitor clipboard data, not even Mac
Starting with iOS 13.3, iOS and iPadOS applications have unlimited access to system-wide clipboard data. The text held in the clipboard may not matter, but it may also be highly sensitive data, such as passwords or financial information. Bakry and Mysk have previously investigated the potential security risks of this vulnerability, and they have discovered that clipboard data can reveal precise location information.
Also note that if Universal Clipboard is enabled, these applications can also access content copied on Mac.
Subscribe to:
Post Comments (Atom)
Search
Featured post
27 good hacker documentary
In the eyes of most people, a group of hackers usually extremely boring nothing interesting people, and that if only the computer code in ...

0 comments:
Post a comment