Joke Collection Website - Blessing messages - What is the origin of "Pegasus"? Apple is helpless with it

What is the origin of "Pegasus"? Apple is helpless with it

Apple has always boasted that its iOS is very safe, and for the privacy and security of users, Apple has indeed done many things that the Android camp cannot do, such as: iOS 14.5 newly launched privacy tracking Transparency features and more. But sometimes Apple is not successful, and there are times when it encounters problems that it cannot solve.

On August 8, the Economic Information Network of CCTV’s Finance Channel broadcast a special program. This program focused on PC and mobile device operating systems. In this report, there was information that even Apple was puzzled about. The information showed that an Israeli software monitoring company was exposed to have sold a mobile phone spy APP named "Pegasus" to some countries. This APP is very powerful and can break through various mobile phone operating systems. For example, Apple's iOS, which is known as the most secure, is not immune.

What’s even more interesting is that Apple’s official response to the “Pegasus” bug is that the “Pegasus vulnerability” cannot be repaired.

However, Apple also responded that "Pegasus" will not attack ordinary users, and Apple continues to upgrade to protect users. So what can this spyware named "Pegasus" do? Once the information display is allowed to invade your mobile phone system, people with ulterior motives can read photos, text messages, and even extract email information and record calls without the owner of the phone being aware of it; remote account opening of mobile phones Cameras and microphones, etc. I saw how terrible this was...

A very interesting story came out after this incident was exposed: the French president immediately changed his iPhone and his mobile phone number at the same time.

For smartphone operating systems, there is no absolute security, only relative security. Just like iOS is safer than Android. But there will always be people with ulterior motives in this world, and both Apple and Android have been fighting against such people. What we can do is try to avoid privacy leaks, do not download apps from unknown sources, and be more careful in daily use.