HACKINTOSH.ORG | Macintosh discussion forums

Macintosh News => iPhone/iPod/iPad News => Topic started by: HCK on September 06, 2018, 04:05:23 pm



Title: Security researcher highlights macOS remote exploit w/ custom URL schemes
Post by: HCK on September 06, 2018, 04:05:23 pm
Security researcher highlights macOS remote exploit w/ custom URL schemes

<div class="feat-image">(https://9to5mac.com/wp-content/uploads/sites/6/2018/09/Screen-Shot-2018-09-04-at-6.39.57-PM.jpeg?quality=82&strip=all&w=1600)</div><p>Security researcher Patrick Wardle is out with a close look (https://objective-see.com/blog/blog_0x38.html) at a how macOS users can be remotely targeted using document handlers and custom URL schemes – which is behind the “Do you want to allow” popup seen in the above screenshot.</p>
<p> <a href="https://9to5mac.com/2018/09/04/security-researcher-highlights-macos-remote-exploit-w-custom-url-schemes/#more-549890" class="more-link">more…[/url]</p><div class="feedflare">
<img src="http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?i=hbklQHjixZY:1cengqpl8KM:D7DqB2pKExk" border="0"></img> (http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?a=hbklQHjixZY:1cengqpl8KM:D7DqB2pKExk)
</div><img src="http://feeds.feedburner.com/~r/9To5Mac-MacAllDay/~4/hbklQHjixZY" height="1" width="1" alt=""/>

Source: Security researcher highlights macOS remote exploit w/ custom URL schemes (http://feedproxy.google.com/~r/9To5Mac-MacAllDay/~3/hbklQHjixZY/)