SlideShare a Scribd company logo
1 of 2
XCS100 Introduction To Web Security
Answer:
Security Hacking And Data Breach
July 2021 by David Peg and Sam Cutler. The article, titled “What is Pegasus spyware and
how does it hack phones?”, gives insights about Pegasus- the powerful spyware developed
by NSO, which is a private company that develops technologies for law-enforcement
agencies and licensed government intelligence (Pegg & Cutler, 2021). As stated in the
article, the spyware, once it is able to capture a device, is capable of accessing possibly
everything from the user’s location to its most personal information stored in the device. It
is even capable of listening to the user’s conversation by having an access to the
microphone of the device. This software, created by the Israeli company NSO, can infect
billions of smart devices with android operating systems or even iOS. With spear-phishing
being the technique opted by first version of Pegasus it has now advanced in its capabilities
to attack a device by infecting them through “zero-click” attacks which are carried out by
exploiting “zero-day” vulnerabilities, that are flaws in an Operating System not yet
discovered by the manufacturers. Recently, the same software is said to be in use to get into
iPhones through iMessage. Similarly, WhatsApp revealed, in 2019, that the Israel based
company was involved in the attack of 1,400 phones made through WhatsApp calls that
were not even received (Pegg & Cutler, 2021).
Claudio Guarnieri, who runs a security lab in Berlin, through his research, has contributed
in the advancement in the understanding of the technicalities of Pegasus. As the software
aims at reaching the maximum number of devices possible, it traps the apps used by most
users like WhatsApp or a default software in the device, the technique of which is also
explained by Guarnieri that have attracted maximum number of NSO’s customers, to shift
from “spear-phishing” to “zero-click” attacks. Along with his team he has also found out that
Pegasus is hazardous to the extent that it can also be installed in the target’s phone through
a nearby wireless transceiver and not only this but it can easily be installed in the device if it
is stolen by an agent. In July 2021, it was found that Pegasus was able to successfully attack
up-to-date versions of iOS (Pegg & Cutler, 2021). Claudio Guarineri have stated that when
the security of an iPhone is breached, it gives access to the attacker to an extent that has not
even been reached by the user. Although, to this report, which was released by Amnesty
International, NSO’s lawyers responded that it was baseless. However, they did not disagree
with any findings stated in the report. Recently, NSO has since invested substantially in
making its software powerful and undetectable. Pegasus is proving itself as a powerful
spyware even to those strictly concerned with the security of their devices and as Guaenieri
states, there is nothing that can be done to stop Pegasus from getting into the device it
wants (Pegg & Cutler, 2021).
References
Pegg, D., & Cutler, S. (2021, July 18). What is Pegasus spyware and how does it hack
phones? Retrieved from The Guardian:
https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-
does-it-hack-phones

More Related Content

Similar to XCS100 Introduction To Web Security.docx

Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
Ali J
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
Lookout
 
Emerging cyber threats_report2012
Emerging cyber threats_report2012Emerging cyber threats_report2012
Emerging cyber threats_report2012
day4justice
 

Similar to XCS100 Introduction To Web Security.docx (20)

Pegasus, A spyware
Pegasus, A spywarePegasus, A spyware
Pegasus, A spyware
 
Tao doc_acid
Tao doc_acidTao doc_acid
Tao doc_acid
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
Bluetooth0.pptx
Bluetooth0.pptxBluetooth0.pptx
Bluetooth0.pptx
 
Google removes fake Signal and Telegram apps hosted on Play.pdf
Google removes fake Signal and Telegram apps hosted on Play.pdfGoogle removes fake Signal and Telegram apps hosted on Play.pdf
Google removes fake Signal and Telegram apps hosted on Play.pdf
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devices
 
Device Hacking
Device HackingDevice Hacking
Device Hacking
 
Emerging cyber threats_report2012
Emerging cyber threats_report2012Emerging cyber threats_report2012
Emerging cyber threats_report2012
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 

More from bkbk37

Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
bkbk37
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
bkbk37
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
bkbk37
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docx
bkbk37
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docx
bkbk37
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docx
bkbk37
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docx
bkbk37
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docx
bkbk37
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docx
bkbk37
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docx
bkbk37
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docx
bkbk37
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docx
bkbk37
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docx
bkbk37
 

More from bkbk37 (20)

Range of.docx
Range of.docxRange of.docx
Range of.docx
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docx
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
 
Race and.docx
Race and.docxRace and.docx
Race and.docx
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docx
 
Racial Disparities.docx
Racial Disparities.docxRacial Disparities.docx
Racial Disparities.docx
 
Race and Technology.docx
Race and Technology.docxRace and Technology.docx
Race and Technology.docx
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docx
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docx
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docx
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docx
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docx
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docx
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docx
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docx
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docx
 
QEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxQEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docx
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docx
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 

XCS100 Introduction To Web Security.docx

  • 1. XCS100 Introduction To Web Security Answer: Security Hacking And Data Breach July 2021 by David Peg and Sam Cutler. The article, titled “What is Pegasus spyware and how does it hack phones?”, gives insights about Pegasus- the powerful spyware developed by NSO, which is a private company that develops technologies for law-enforcement agencies and licensed government intelligence (Pegg & Cutler, 2021). As stated in the article, the spyware, once it is able to capture a device, is capable of accessing possibly everything from the user’s location to its most personal information stored in the device. It is even capable of listening to the user’s conversation by having an access to the microphone of the device. This software, created by the Israeli company NSO, can infect billions of smart devices with android operating systems or even iOS. With spear-phishing being the technique opted by first version of Pegasus it has now advanced in its capabilities to attack a device by infecting them through “zero-click” attacks which are carried out by exploiting “zero-day” vulnerabilities, that are flaws in an Operating System not yet discovered by the manufacturers. Recently, the same software is said to be in use to get into iPhones through iMessage. Similarly, WhatsApp revealed, in 2019, that the Israel based company was involved in the attack of 1,400 phones made through WhatsApp calls that were not even received (Pegg & Cutler, 2021). Claudio Guarnieri, who runs a security lab in Berlin, through his research, has contributed in the advancement in the understanding of the technicalities of Pegasus. As the software aims at reaching the maximum number of devices possible, it traps the apps used by most users like WhatsApp or a default software in the device, the technique of which is also explained by Guarnieri that have attracted maximum number of NSO’s customers, to shift from “spear-phishing” to “zero-click” attacks. Along with his team he has also found out that Pegasus is hazardous to the extent that it can also be installed in the target’s phone through a nearby wireless transceiver and not only this but it can easily be installed in the device if it is stolen by an agent. In July 2021, it was found that Pegasus was able to successfully attack up-to-date versions of iOS (Pegg & Cutler, 2021). Claudio Guarineri have stated that when the security of an iPhone is breached, it gives access to the attacker to an extent that has not even been reached by the user. Although, to this report, which was released by Amnesty International, NSO’s lawyers responded that it was baseless. However, they did not disagree
  • 2. with any findings stated in the report. Recently, NSO has since invested substantially in making its software powerful and undetectable. Pegasus is proving itself as a powerful spyware even to those strictly concerned with the security of their devices and as Guaenieri states, there is nothing that can be done to stop Pegasus from getting into the device it wants (Pegg & Cutler, 2021). References Pegg, D., & Cutler, S. (2021, July 18). What is Pegasus spyware and how does it hack phones? Retrieved from The Guardian: https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how- does-it-hack-phones