![]() ![]() "The attack on Amnesty International was the final straw," Ingleton added. In August 2018, an Amnesty staff member was targeted by NSO's Pegasus, software that has also been linked to attacks in Saudi Arabia, Mexico and the United Arab Emirates. ![]() "NSO Group sells its products to governments who are known for outrageous human rights abuses, giving them the tools to track activists and critics," said Amnesty's Danna Ingleton. Ironically, on Monday Amnesty International said that it was "supporting legal action to take the Israeli Ministry of Defence (MoD) to court, to demand that it revokes the export license of NSO Group, an Israeli company whose spyware products have been used in chilling attacks on human rights defenders around the world. In a petition to be filed tomorrow at the District Court of Tel Aviv, approximately 30 members and supporters of Amnesty International Israel and others from the human rights community set out how the MoD has put human rights at risk by allowing NSO to continue exporting its products." Or as Facebook somewhat drily said: "A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of SRTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15." ![]() When the data is received, WhatsApp's internal buffer is forced to overflow, overwriting other parts of the app's memory, and control is given over to the application. The WhatsApp vulnerability is a buffer overflow weakness, enabling malicious code to be inserted into data packets sent during the process of starting a voice call. ![]()
0 Comments
Leave a Reply. |