Warning occurs when suspicious software wants to access user information.
And just write a few more simple lines of code, your malware can bypass the user warning dialog and get access to geographic location, contact list and more without verification .
Hacker can only take advantage of this vulnerability to bypass the warning request verification and click OK but cannot break the user's password.
However, this finding also shows that the most basic protection mechanism can be cracked easily and manufacturers need to further enhance the security elements of the operating system.
The vulnerability can be fixed in the next macOS Mojave update.
See more:
Foreshadow - the fifth most serious security hole in the CPU in 2018
Millions of Android devices stick with security holes in firmware, hackers can exploit to lock users' machines
iPhone and Android smartphone series stick with serious Bluetooth security error
Hackers took control of 18,000 Huawei router devices in just one day
security researchers have just disclosed a new vulnerability affecting three different wordpress plugins, posing a security risk to 84,000 websites. by exploiting this vulnerability, hackers can take control of the affected websites.
international security researchers have found an entirely new linux vulnerability that allows potential attackers to hijack vpn connections on the device * nix and 'inject' the arbitrary data payload into it. tcp4 and ipv6 streams.
mozilla has just released a security update to patch a critical security vulnerability that allows hackers to escalate privileges on windows computers. this critical security flaw has been patched in the recently released version of firefox 97.
adobe has just released the may security update to patch security holes in 12 of their products. among them is a serious zero-day vulnerability in adobe reader that is being actively exploited by hackers.
linus henze, an 18-year-old german, recently claimed to have discovered a serious security flaw on macos that could expose the machine's storage passwords to malicious applications.
by default, cortana will always listen to users' requests, even if the lock screen on windows 10, this is the hole that gives hackers the opportunity to manipulate the device and install malicious code. in computer.