Joke Collection Website - Blessing messages - What is the origin of "Pegasus"? Apple is helpless with it
What is the origin of "Pegasus"? Apple is helpless with it
Apple has always boasted that its iOS is very safe, and for the privacy and security of users, Apple has indeed done many things that the Android camp cannot do, such as: iOS 14.5 newly launched privacy tracking Transparency features and more. But sometimes Apple is not successful, and there are times when it encounters problems that it cannot solve.
On August 8, the Economic Information Network of CCTV’s Finance Channel broadcast a special program. This program focused on PC and mobile device operating systems. In this report, there was information that even Apple was puzzled about. The information showed that an Israeli software monitoring company was exposed to have sold a mobile phone spy APP named "Pegasus" to some countries. This APP is very powerful and can break through various mobile phone operating systems. For example, Apple's iOS, which is known as the most secure, is not immune.
What’s even more interesting is that Apple’s official response to the “Pegasus” bug is that the “Pegasus vulnerability” cannot be repaired.
However, Apple also responded that "Pegasus" will not attack ordinary users, and Apple continues to upgrade to protect users. So what can this spyware named "Pegasus" do? Once the information display is allowed to invade your mobile phone system, people with ulterior motives can read photos, text messages, and even extract email information and record calls without the owner of the phone being aware of it; remote account opening of mobile phones Cameras and microphones, etc. I saw how terrible this was...
A very interesting story came out after this incident was exposed: the French president immediately changed his iPhone and his mobile phone number at the same time.
For smartphone operating systems, there is no absolute security, only relative security. Just like iOS is safer than Android. But there will always be people with ulterior motives in this world, and both Apple and Android have been fighting against such people. What we can do is try to avoid privacy leaks, do not download apps from unknown sources, and be more careful in daily use.
- Related articles
- Which package of Shanghai Mobile 202 1 has the highest cost performance?
- The latest news of Wugang epidemic in 2022 when will the school resume classes?
- A letter from the teacher to the parents of students.
- How do new account managers find customers?
- Can regular employees of public institutions stop paying wages if they don't come to work for more than half a year?
- A thank-you letter to a university teacher
- I forgot my mobile phone number. What should I do if I change my mobile phone number?
- 1065800007528, how to cancel the morning and evening news?
- How to report violations of vehicles in Zhuhai
- Why does the girl with the goods receive the receiving information that does not belong to her?