nEO_IMG_ios9-3-5-0day-iphone-hacking-nso-pegasus-cover.jpg

 

發現有不少朋友還沒更新,特地發一篇文來呼籲各位蘋果用戶盡快更新。 由加拿大多倫多大學蒙克全球事務學院(Munk SchoolofGlobalAffairs)公民實驗室研究人員與美國舊金山安全公司Lookout所公佈的存在多年的iOS漏洞,研究分析指出與NSO組織使用Pegasus間諜軟體有關,攻擊者自稱稱為「三叉戟」的3種0day漏洞,可透過iOS設備進行監聽目標者設備上簡訊、密碼與GPS等APP訊息,所以蘋果短時間內緊急推出 iOS 9.3.5 修正。

為了保護自身隱私安全,請所有蘋果用戶盡快更新!

 

蘋果更新說明:https://support.apple.com/zh-tw/HT207107

Kernel

  • Available for: iPhone 4s and later, iPad 2 and later, iPod touch (5th generation) and later
  • Impact: An application may be able to disclose kernel memory
  • Description: A validation issue was addressed through improved input sanitization.
  • CVE-2016-4655: Citizen Lab and Lookout 

Kernel

  • Available for: iPhone 4s and later, iPad 2 and later, iPod touch (5th generation) and later
  • Impact: An application may be able to execute arbitrary code with kernel privileges
  • Description: A memory corruption issue was addressed through improved memory handling.
  • CVE-2016-4656: Citizen Lab and Lookout

WebKit

  • Available for: iPhone 4s and later, iPad 2 and later, iPod touch (5th generation) and later
  • Impact: Visiting a maliciously crafted website may lead to arbitrary code execution
  • Description: A memory corruption issue was addressed through improved memory handling.
  • CVE-2016-4657: Citizen Lab and Lookout

 

iOS9.3.5 更新方法 (截圖為舊版,流程沒變)

方法一. 直接透過OTA進行升級,進入設定→點擊軟體更新。

nEO_IMG_iOS9.3.2_5553.jpg nEO_IMG_iOS9.3.2_3227.jpg

 

點擊下載並安裝即會開始更新。下載建議使用WIFI網路比較穩。

nEO_IMG_iOS9.3.2_5761.jpg nEO_IMG_iOS9.3.2_3550.jpg

 

方法二. (建議使用此方法)接上電腦開啟iTunes點選「更新」升級到iOS9.3.5

nEO_IMG_更新.jpg

 

為了保護自身隱私安全,請所有蘋果用戶盡快更新!

 

編輯:蔡小宇

arrow
arrow

    麥兜小米 發表在 痞客邦 留言(0) 人氣()