Those root-level user privileges mean the attacker can access the underlying macOS operating system, which are typically off-limits to most users, making it easier to run malware or spyware without the user noticing. Wardle found that a local attacker with low-level user privileges can inject the Zoom installer with malicious code to obtain the highest level of user privileges, known as "root." Zoom uses a "shady" technique - one that's also used by Mac malware - to install the Mac app without user interaction. Wardle's first bug piggybacks off a previous finding. An ex-NSA hacker has found yet another critical security flaw in Zoom, this time in two bugs for Mac.Īccording to TechCrunch, an ex-NSA hacker has found two bugs within the macOS version of Zoom:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |