{"id":95598,"date":"2019-08-30T18:10:27","date_gmt":"2019-08-31T01:10:27","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2019\/08\/mysterious-ios-attack-changes-everything-we-know-about-iphone-hacking"},"modified":"2019-08-30T18:10:27","modified_gmt":"2019-08-31T01:10:27","slug":"mysterious-ios-attack-changes-everything-we-know-about-iphone-hacking","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2019\/08\/mysterious-ios-attack-changes-everything-we-know-about-iphone-hacking","title":{"rendered":"Mysterious iOS Attack Changes Everything We Know About iPhone Hacking"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/mysterious-ios-attack-changes-everything-we-know-about-iphone-hacking2.jpg\"><\/a><\/p>\n<p>Hacking the iPhone has long been considered <a href=\"https:\/\/www.wired.com\/story\/imessage-interactionless-hacks-google-project-zero\/\">a rarified endeavor<\/a>, undertaken by sophisticated nation-states <a class=\"\"  href=\"https:\/\/citizenlab.ca\/2016\/08\/million-dollar-dissident-iphone-zero-day-nso-group-uae\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">against<\/a> only their most high-value targets. But a discovery by a group of Google researchers has turned that notion on its head: For two years, someone has been exploiting a rich collection of iPhone vulnerabilities with anything but restraint or careful targeting. And they\u2019ve indiscriminately hacked thousands of iPhones just by getting them to visit a website.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacking the iPhone has long been considered a rarified endeavor, undertaken by sophisticated nation-states against only their most high-value targets. But a discovery by a group of Google researchers has turned that notion on its head: For two years, someone has been exploiting a rich collection of iPhone vulnerabilities with anything but restraint or careful [\u2026]<\/p>\n","protected":false},"author":440,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1512],"tags":[],"class_list":["post-95598","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-mobile-phones"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/95598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/440"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=95598"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/95598\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=95598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=95598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=95598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}