Prima pagina Vizualizeaza site-ul in limba:   RO Romana

Abonare newsletter:

How Just Visiting A Site Could Have Hacked Your iPhone or MacBook Camera

If you use Apple iPhone or MacBook, here we have a piece of alarming news for you. Turns out merely visiting a website — not just malicious but also legitimate sites unknowingly loading malicious ads as well — using Safari browser could have let remote attackers secretly access your device's camera, microphone, or location, and in some cases, saved passwords as well.

Zoom issues lets hackers steal Windows credentials

Zoom issues fix for UNC vulnerability that lets hackers steal Windows credentials via chat. After this story and others went live April 1, Zoom CEO Eric Yuan addressed Zoom security and other issues in a blog post. Part of the blog post detailed a bug fix to be released, which would fix the UNC vulnerability described in our original story, among other things. The fix appears to be pushing out automatically to users. An unpatched vulnerability within Zoom allows an attacker to drop a malicious link into a chat window and use it to steal a Windows password, according to reports.

Hacked in Translation – from Subtitles to Complete Takeover

Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time and We estimate there are approximately 200 million video players and streamers that currently run the vulnerable software, making this one of the most widespread, easily accessed and zero-resistance vulnerability reported in recent years.

Migrating to McAfee Endpoint Security

End-Point Security 2017 March 14 

“When you move from a tiny apartment, it doesn’t take long and you can use a Honda Civic,” says Desktop Security Manager Mehdi Harandi, who oversees endpoint security at Fairfax County Public Schools, the 11th largest school district in the U.S. “But when you try to move from a five-bedroom house, it takes a lot more time and the Civic just won’t cut it anymore; you need an 18-wheeler.”

McAfee Endpoint Protection for SMB

McAfee Endpoint Protection for SMB provides superior security, specifically designed for small and medium-size businesses. It combines McAfee’s award-winning threat protection technologies with web and messaging security and data protection — all to secure your internal IT infrastructure — plus rigorous mobile security and mobile device management that provide controlled access to your corporate network.

Kerio Control UTM firewall

Kerio Control este un UTM Firewall premiat in industria IT, care raspunde perfect nevoilor de securitate ale companiilor de nivel mediu si small business.

Update-urile de securitate ale Kerio Control se efectueaza in mod automat, acesta auto-detectand si auto-prevenind posibile amenintari; pentru administratorii de retea

McAfee si Intel lanseaza DeepSAFE™

DeepSAFE este prima tehnologie dezvoltata de catre McAfee si Intel in colaborare.
Primul produs care va utiliza tehnologia DeepSAFE a fost anuntat la conferinta McAfee FOCUS 11, in Las Vegas in perioada 18 – 20 octombrie 2011.

IT Point Services reseller autorizat

  • Dell partnerdirect registered 2011 rgb
  • Int security i hrz rgb 3000
  • Keriopartner
home » Stiri » How Just Visiting A Site Could Have Hacked Your iPhone or MacBook Camera « Inapoi la pagina anterioara

How Just Visiting A Site Could Have Hacked Your iPhone or MacBook Camera

Apple recently paid a $75,000 bounty reward to an ethical hacker, Ryan Pickren, who practically demonstrated the hack and helped the company patch a total of seven new vulnerabilities before any real attacker could take advantage of them. The fixes were issued in a series of updates to Safari spanning versions 13.0.5 (released January 28, 2020) and Safari 13.1 (published March 24, 2020).

"If the malicious website wanted camera access, all it had to do was masquerade as a trusted video-conferencing website such as Skype or Zoom," Pickren said.


When chained together, three of the reported Safari flaws could have allowed malicious sites to impersonate any legit site a victim trusts and access camera or microphone by abusing the permissions that were otherwise explicitly granted by the victim to the trusted domain only.


An Exploit Chain to Abuse Safari's Per-Site Permissions

Safari browser grants access to certain permissions such as camera, microphone, location, and more on a per-website basis. This makes it easy for individual websites, say Skype, to access the camera without asking for the user's permission every time the app is launched.

But there are exceptions to this rule on iOS. While third-party apps must require user's explicit consent to access the camera, Safari can access the camera or the photo gallery without any permission prompts.

Specifically, improper access is made possible by leveraging an exploit chain that stringed together multiple flaws in the way the browser parsed URL schemes and handled the security settings on a per-website basis. This method only works with websites that are currently open.

"A more important observation was that the URL's scheme is completely ignored," Pickren noted. "This is problematic because some schemes don't contain a meaningful hostname at all, such as file:, javascript:, or data:."

Put another way, Safari failed to check if the websites adhered to the same-origin policy, thereby granting access to a different site that shouldn't have obtained permissions in the first place. As a result, a website such as "" and its malicious counterpart "fake://" could end up having the same permissions.

Thus, by taking advantage of Safari's lazy hostname parsing, it was possible to use a "file:" URI (e.g., file:///path/to/file/index.html) to fool the browser into changing the domain name using JavaScript.

"Safari thinks we are on, and I can load some evil JavaScript. Camera, Microphone, and Screen Sharing are all compromised when you open my local HTML file," Pickren said.

The research found that even plaintext passwords can be stolen this way as Safari uses the same approach to detect websites on which password auto-fill needs to be applied.

Furthermore, auto-download preventions can be bypassed by first opening a trusted site as a pop-up, and subsequently using it to download a malicious file.

Likewise, a "blob:" URI (e.g. blob:// can be exploited to run arbitrary JavaScript code, using it to directly access the victim's webcam without permission.

In all, the research uncovered seven different zero-day vulnerabilities in Safari


  • CVE-2020-3852: A URL scheme may be incorrectly ignored when determining multimedia permission for a website
  • CVE-2020-3864: A DOM object context may not have had a unique security origin
  • CVE-2020-3865: A top-level DOM object context may have incorrectly been considered secure
  • CVE-2020-3885: A file URL may be incorrectly processed
  • CVE-2020-3887: A download's origin may be incorrectly associated
  • CVE-2020-9784: A malicious iframe may use another website's download settings
  • CVE-2020-9787: A URL scheme containing dash (-) and period (.) adjacent to each other is incorrectly ignored when determining multimedia permission for a website

If you are a Safari user, it's recommended that you keep the browser up-to-date and ensure websites are granted access to only those settings which are essential for them to function.