[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
all.html malware-apple.html proprietary-back-doors.html proprieta...
From: |
Diff Report |
Subject: |
all.html malware-apple.html proprietary-back-doors.html proprieta... |
Date: |
Mon, 11 Nov 2024 00:04:34 -0500 |
Modified:
all.html
malware-apple.html
proprietary-back-doors.html
proprietary.html
proprietary-insecurity.html
diff -rNU2 all.html all.html
--- all.html 2024-11-10 05:05:49.123428457 +0000
+++ all.html 2024-11-11 05:04:32.071620599 +0000
@@ -60,4 +60,21 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
+<!--#set var='ADD' value='2024-11-10' -->
+<!--#set var='PUB' value='2023-12-27' -->
+<li><small class='date-tag'>Added: <span class="gnun-split"></span>
+<!--#echo encoding='none' var='ADD' --><span class="gnun-split"></span>
+— Latest reference: <span class="gnun-split"></span><!--#echo
+encoding='none' var='PUB' --></small>
+ <p><a
+
href="https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature/">
+ A back door in Apple devices</a>, present and abused from at least
+ 2019 until 2023, allowed crackers to have full control over them by
+ sending iMessage texts that installed malware without any action on
+ the user's part. Infections, among other things, gave the intruders
+ access to owners' microphone recordings, photos, location and other
+ personal data.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec; don't edit in all.html. -->
<!--#set var='ADD' value='2024-07-31' -->
<!--#set var='PUB' value='2024-05-24' -->
@@ -5109,5 +5126,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/11/09 14:35:46 $
+$Date: 2024/11/10 15:50:50 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-apple.html malware-apple.html
--- malware-apple.html 2024-11-10 05:05:49.135428472 +0000
+++ malware-apple.html 2024-11-11 05:04:32.083620443 +0000
@@ -279,4 +279,18 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in malware-apple.html. -->
+ <li id="M202312270">
+ <!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature/">
+ A back door in Apple devices</a>, present and abused from at least
+ 2019 until 2023, allowed crackers to have full control over them by
+ sending iMessage texts that installed malware without any action on
+ the user's part. Infections, among other things, gave the intruders
+ access to owners' microphone recordings, photos, location and other
+ personal data.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in malware-apple.html. -->
<li id="M202201040">
<!--#set var="DATE" value='<small class="date-tag">2022-01</small>'
@@ -1417,5 +1431,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/11/06 10:08:10 $
+$Date: 2024/11/10 15:50:50 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-back-doors.html proprietary-back-doors.html
--- proprietary-back-doors.html 2024-11-10 05:05:49.175428522 +0000
+++ proprietary-back-doors.html 2024-11-11 05:04:32.111620077 +0000
@@ -992,4 +992,18 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-back-doors.html.
-->
+ <li id="M202312270">
+ <!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature/">
+ A back door in Apple devices</a>, present and abused from at least
+ 2019 until 2023, allowed crackers to have full control over them by
+ sending iMessage texts that installed malware without any action on
+ the user's part. Infections, among other things, gave the intruders
+ access to owners' microphone recordings, photos, location and other
+ personal data.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-back-doors.html.
-->
<li id="M201711204">
<!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
@@ -1151,5 +1165,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/11/06 10:08:10 $
+$Date: 2024/11/10 15:50:50 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary.html proprietary.html
--- proprietary.html 2024-11-10 05:05:49.199428553 +0000
+++ proprietary.html 2024-11-11 05:04:32.127619868 +0000
@@ -234,4 +234,18 @@
<ul class="blurbs">
<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
+ <li id="M202312270">
+ <!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature/">
+ A back door in Apple devices</a>, present and abused from at least
+ 2019 until 2023, allowed crackers to have full control over them by
+ sending iMessage texts that installed malware without any action on
+ the user's part. Infections, among other things, gave the intruders
+ access to owners' microphone recordings, photos, location and other
+ personal data.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
<li id="M202405240">
<!--#set var="DATE" value='<small class="date-tag">2024-05</small>'
@@ -295,20 +309,4 @@
mean “break security.”)</small></p>
</li>
-
-<!-- Copied from workshop/mal.rec. Do not edit in proprietary.html. -->
- <li id="M202311101">
- <!--#set var="DATE" value='<small class="date-tag">2023-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft has been annoying people who wanted to
- close the proprietary program OneDrive on their computers, <a
-
href="https://www.theverge.com/2023/11/8/23952878/microsoft-onedrive-windows-close-app-notification">
- forcing them to give the reason why they were closing it</a>. This
- prompt was removed after public pressure.</p>
-
- <p>This is a reminder that angry users still have the power to make
- developers of proprietary software remove small annoyances. Don't
- count on public outcry to make them remove more profitable malware,
- though. Run away from proprietary software!</p>
- </li>
</ul>
<p class="button right-align">
@@ -373,5 +371,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/07/31 08:02:55 $
+$Date: 2024/11/10 15:50:50 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-insecurity.html proprietary-insecurity.html
--- proprietary-insecurity.html 2024-11-10 05:05:49.203428557 +0000
+++ proprietary-insecurity.html 2024-11-11 05:04:32.131619816 +0000
@@ -127,4 +127,18 @@
<!-- Copied from workshop/mal.rec. Do not edit in proprietary-insecurity.html.
-->
+ <li id="M202312270">
+ <!--#set var="DATE" value='<small class="date-tag">2023-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature/">
+ A back door in Apple devices</a>, present and abused from at least
+ 2019 until 2023, allowed crackers to have full control over them by
+ sending iMessage texts that installed malware without any action on
+ the user's part. Infections, among other things, gave the intruders
+ access to owners' microphone recordings, photos, location and other
+ personal data.</p>
+ </li>
+
+<!-- Copied from workshop/mal.rec. Do not edit in proprietary-insecurity.html.
-->
<li id="M202311300">
<!--#set var="DATE" value='<small class="date-tag">2023-11</small>'
@@ -1543,5 +1557,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2024/11/09 14:35:46 $
+$Date: 2024/11/10 15:50:50 $
<!-- timestamp end -->
</p>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- all.html malware-apple.html proprietary-back-doors.html proprieta...,
Diff Report <=