Anna Amato was just two when she moved to Britain from Italy with her parents 55 years ago.
On Aug. 29, 1997, Skynet became self-aware. On Aug. 30, 2019, a new trailer for Terminator: Dark Fate became available. And as in the teaser released in May, it would very much like to emphasise that the Rise Of The Machines/Genisys/Salvation timeline is as dead as… well, all of humanity in the future.
If you’d like to be surprised, look away now, because this trailer is packed with details designed to reassure you that this is the Terminator franchise, classic flavour. We get Mackenzie Davis’s I-come-from-the-future exposition explaining that Sarah Connor did not, in fact, avert Judgement Day; Linda Hamilton’s Connor smirking and wisecracking like the apocalypse-averting veteran she is (complete with a callback I’d rather have been surprised by); and some absolutely wild-looking fight scenes — including a moment where Gabriel Luna’s evil new-model nanomorph appears to split itself into two separate humanoids. Read more…
Security researchers at Google say they’ve found a number of malicious websites which, when visited, could quietly hack into a victim’s iPhone by exploiting a set of previously undisclosed software flaws.
Google’s Project Zero said in a deep-dive blog post published late on Thursday that the websites were visited thousands of times per week by unsuspecting victims, in what they described as an “indiscriminate” attack.
“Simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant,” said Ian Beer, a security researcher at Project Zero.
He said the websites had been hacking iPhones over a “period of at least two years.”
The researchers found five distinct exploit chains involving 12 separate security flaws, including seven involving Safari, the in-built web browser on iPhones. The five separate attack chains allowed an attacker to gain “root” access to the device — the highest level of access and privilege on an iPhone. In doing so, an attacker could gain access to the device’s full range of features normally off-limits to the user. That means an attacker could quietly install malicious apps to spy on an iPhone owner without their knowledge or consent.
Google said based off their analysis, the vulnerabilities were used to steal a user’s photos and messages as well as track their location in near-realtime. The “implant” could also access the user’s on-device bank of saved passwords.
The vulnerabilities affect iOS 10 through to the current iOS 12 software version.
Google privately disclosed the vulnerabilities in February, giving Apple only a week to fix the flaws and roll out updates to its users. That’s a fraction of the 90 days typically given to software developers, giving an indication of the severity of the vulnerabilities.
Apple issued a fix six days later with iOS 12.1.4 for iPhone 5s and iPad Air and later.
Beer said it’s possible other hacking campaigns are currently in action.
The iPhone and iPad maker in general has a good rap on security and privacy matters. Recently the company increased its maximum bug bounty payout to $1 million for security researchers who find flaws that can silently target an iPhone and gain root-level privileges without any user interaction. Under Apple’s new bounty rules — set to go into effect later this year — Google would’ve been eligible for several million dollars in bounties.
When reached, a spokesperson for Apple declined to comment.