Like if nobody “asks” a piece of software to execute how does it get downloaded to my phone or PC and then execute it self ? I can understand attacks e.g where you download a jpeg and then click to open it and the jpeg had some extra malicious code in it etc, but without anybody “authorizing” anything how does the kernel allow the code to be run by the cpu etc ?
**EDIT** I am talking about forced entry zero click software like the one pegasus created for iphones
In: 190
Your devices are usually doing things like downloading emails and messages in the background. And they actually read the content of those messages so they can put some info in the notification.
So if there is a bug in how those programs read the message/email this can be used to execute malware was soon as the device receives the message, without the user even having to click to open the message themselves.
Latest Answers