Title: Security researcher highlights macOS remote exploit w/ custom URL schemes Post by: HCK on September 06, 2018, 04:05:23 pm Security researcher highlights macOS remote exploit w/ custom URL schemes
<div class="feat-image">(https://9to5mac.com/wp-content/uploads/sites/6/2018/09/Screen-Shot-2018-09-04-at-6.39.57-PM.jpeg?quality=82&strip=all&w=1600)</div><p>Security researcher Patrick Wardle is out with a close look (https://objective-see.com/blog/blog_0x38.html) at a how macOS users can be remotely targeted using document handlers and custom URL schemes – which is behind the “Do you want to allow” popup seen in the above screenshot.</p> <p> <a href="https://9to5mac.com/2018/09/04/security-researcher-highlights-macos-remote-exploit-w-custom-url-schemes/#more-549890" class="more-link">more…[/url]</p><div class="feedflare"> <img src="http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?i=hbklQHjixZY:1cengqpl8KM:D7DqB2pKExk" border="0"></img> (http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?a=hbklQHjixZY:1cengqpl8KM:D7DqB2pKExk) </div><img src="http://feeds.feedburner.com/~r/9To5Mac-MacAllDay/~4/hbklQHjixZY" height="1" width="1" alt=""/> Source: Security researcher highlights macOS remote exploit w/ custom URL schemes (http://feedproxy.google.com/~r/9To5Mac-MacAllDay/~3/hbklQHjixZY/) |