Like if nobody “asks” a piece of software to execute how does it get downloaded to my phone or PC and then execute it self ? I can understand attacks e.g where you download a jpeg and then click to open it and the jpeg had some extra malicious code in it etc, but without anybody “authorizing” anything how does the kernel allow the code to be run by the cpu etc ?
**EDIT** I am talking about forced entry zero click software like the one pegasus created for iphones
In: 190
In order for your experience as a user to make it appear as though you can do as you desire the computer has to complete alot of tasks, some of these tasks are triggered based on events such as looking at a text. The task could be to just check whether the text had a link and render a new button on your screen or even talk to another computer about it. It’s these tasks that have weakness that are exploited.
Latest Answers