MADRID, 25 Nov. (Portaltic/EP) –

Apple has given more details about the operation of the threat notifications sent to users of their devices affected by state-sponsored cyberattacks, and has explained how they are shown to those who may be affected.

The American company ad on Tuesday its Complaint against the Israeli company NSO Group, responsible for Pegasus spyware, for “surveillance and selective attack on users of Apple devices.”

In the case of users affected by the FORCEDENTRY attack, used by Pegasus and which took advantage of a vulnerability in Apple devices, the manufacturer also assured that he was warning “the few users who may have been victims“.

Now, Apple has provided more information at a supporting document on how these threat notifications are provided to individual users to help protect them from state-sponsored attacks.

In these cases, the company has explained that it can inform those affected in two ways. The first one consists of a Threat notification displayed at the top of the page after the user signs up on the web with their Apple ID.

In the second case, Apple can also send a email or notification through your iMessage app to the ’email’ or phone numbers associated with the user’s Apple ID.

In these notifications, in addition, Apple provides additional information and the steps that those affected must follow to protect their devices under attack by States, a modality that is usually very sophisticated and evolves rapidly.

Some threat notifications from Apple may be false alarms or some attacks may go undetected“, has recognized the support of Apple, that does not provide information on the causes for which alerts are issued so as not to help the attackers themselves.

To verify that these notifications are true, Apple has encouraged affected users to access your Apple ID profile from your website, where they will be clearly visible at the top.

The company has also recommended to its users that continue to use basic protection measures against attacks, with practices like keeping computers up-to-date, using strong passwords and two-step verification, installing apps only from official sources like the App Store, and not clicking links or opening attachments from unknown senders.



Source link

By admin