Google, Amazon, and Facebook are always listening. But what’s worse? Hackers are listening, too. Windows PCs are particularly vulnerable, but with a few simple commands, a remote attacker can even take over the microphone on someone’s Mac computer, streaming audio and listening to private conversations in real time without the victim’s knowledge, abusing an overlooked security consideration.

After an attacker has established a backdoor on a vulnerable MacBook or compromised the device remotely using a fake PDF, they can use modern post-exploitation frameworks like Empire or Metasploit to… more


Go to Source

 

Comments are closed.