{"id":18858,"date":"2021-07-21T19:16:55","date_gmt":"2021-07-21T19:16:55","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18858"},"modified":"2021-07-21T19:27:28","modified_gmt":"2021-07-21T19:27:28","slug":"apple-security-nso-spyware-scandal","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/","title":{"rendered":"Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal"},"content":{"rendered":"<p>Reports that the NSO Group\u2019s Pegasus spyware was used by governments to spy on Apple iPhones used by journalists, activists, government officials and business executives is becoming a global controversy for NSO, Apple and a number of governments at the center of the scandal.<\/p>\n<p>Amnesty International and Forbidden Stories\u00a0\u2013 a Paris-based nonprofit media group that works with journalists \u2013 <a href=\"https:\/\/www.amnesty.org\/en\/latest\/trends\/\/2021\/07\/pegasus-project-apple-iphones-compromised-by-nso-spyware\/\" target=\"_blank\" rel=\"noopener\">said earlier this week<\/a> that users of the Israeli-developed spyware were able to hack into iPhone 11 and iPhone 12 devices, as well as Android devices, of tens of thousands of people \u2013 including a number of world leaders. The software has even been linked to the disappearance of the United Arab Emirates&#8217; <a href=\"https:\/\/www.washingtonpost.com\/world\/2021\/07\/21\/dubai-princesses-spyware\/\" target=\"_blank\" rel=\"noopener\">Princess Latifa<\/a>.<\/p>\n<p>The software is designed to enable users to remotely extract data \u2013 emails, messages and photos \u2013 from the devices as well as record calls and activate microphones and cameras. They also can grab conversations that occur on such social media apps as WhatsApp. NSO Group has argued for years that Pegasus is meant to help governments and law enforcement agencies fight back against global threats like crime and terrorism, but it&#8217;s becoming apparent that the software has been weaponized by hostile parties too.<\/p>\n<h2>Journalists, Government Officials Targeted<\/h2>\n<p>As first <a href=\"https:\/\/www.theguardian.com\/world\/2021\/jul\/18\/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus\" target=\"_blank\" rel=\"noopener\">reported<\/a> in <em>The Guardian<\/em>, a large data leak unveiled a list of more than 50,000 phone numbers of people that were in the crosshairs of NSO customers dating back to 2016, including more than 180 journalists worldwide. The revelations suggest that some Pegasus users, such as authoritarian governments, were using the spyware to track people who weren\u2019t criminals or terrorists.<\/p>\n<p>That has included such people as <a href=\"https:\/\/www.amnesty.org\/en\/latest\/trends\/\/2021\/07\/world-leaders-potential-targets-of-nso-group-pegasus-spyware\/\" target=\"_blank\" rel=\"noopener\">French President Emmanuel Macron<\/a> and hundreds of other state leaders and government officials, whose phone numbers were on the list obtained by Amnesty International and Forbidden Stories as part of the Pegasus Project. The Israeli government <a href=\"https:\/\/www.axios.com\/israel-nso-pegasus-spyware-crisis-31159eae-7246-49b5-ab3f-d3d332d9fffe.html\" target=\"_blank\" rel=\"noopener\">reportedly<\/a> has created a group to oversee damage control while other governments in such places as Hungary and Saudi Arabia are under fire for using the spyware.<\/p>\n<p>The impact of the burgeoning scandal continues to ripple. Top public cloud provider Amazon Web Services (AWS) disabled all accounts linked to the Israeli company.<\/p>\n<h2>Apple Under Fire<\/h2>\n<p>Apple, which for years has loudly touted the security of its iPhones, is coming under pressure to work more closely with other device makers to push back against technology like Pegasus.<\/p>\n<p>In a statement to journalists, Apple officials argued that the company has worked with security experts outside of the company, which has resulted in the iPhone being \u201cthe safest, most secure consumer mobile device on the market.\u201d They also looked to tamp down concern that the Pegasus situation is a widespread problem.<\/p>\n<p>\u201cAttacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life and are used to target specific individuals,\u201d the Apple statement said. \u201cWhile that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data.\u201d<\/p>\n<p>However, Danna Ingleton, deputy director of Amnesty Tech, said in a statement that \u201cApple prides itself on its security and privacy features, but NSO Group has ripped these apart. Our forensic analysis has uncovered irrefutable evidence that through iMessage zero-click attacks, NSO\u2019s spyware has successfully infected iPhone 11 and iPhone 12 models. Thousands of iPhones have potentially been compromised. &#8230; This is a global concern. Anyone and everyone is at risk, and even technology giants like Apple are ill-equipped to deal with the massive scale of surveillance at hand.\u201d<\/p>\n<h2>Mobile Security, Privacy at Issue<\/h2>\n<p>Oliver Tavakoli, CTO at cybersecurity firm Vectra, told <em>eSecurity Planet<\/em> that \u201cit\u2019s clear that the iOS iMessage service is a bit of a mess from a security perspective.\u201d<\/p>\n<p>\u201cApple has added more and more functionality to it and every piece of functionality comes with the potential for exploitable vulnerabilities,\u201d Tavakoli said. \u201cAlso, the fact that iMessage does not distinguish how it handles inbound messages from known contacts vs. perfect strangers opens phones up to exploitation from anywhere. Accepting processing messages from anyone is the equivalent of running a network connected to the internet with no firewall.\u201d<\/p>\n<p>To Setu Kulkarni, vice president of strategy at NTT Application Security, this is a moment to rally around tech companies as they push back against software like Pegasus, adding that the \u201cthe line between acceptable surveillance (if any) and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\">privacy intrusion<\/a> is very thin.\u201d<\/p>\n<p>\u201cFor Apple and other manufactures, this is a moment of reckoning to get further entrenched with the governments to create more checks and balances while they make their platform more impenetrable for bad actors,\u201d Kulkarni told <em>eSecurity Planet<\/em>. \u201cFor lawmakers, this is a moment of reckoning as well to create consequences for misuse of such utilities.\u201d<\/p>\n<h2>NSO Group Pushes Back<\/h2>\n<p>NSO Group officials in a <a href=\"https:\/\/www.nsogroup.com\/trends\/es\/following-the-publication-of-the-recent-article-by-forbidden-stories-we-wanted-to-directly-address-the-false-accusations-and-misleading-allegations-presented-there\/\" target=\"_blank\" rel=\"noopener\">statement<\/a> denied the accusations in the initial report by Forbidden Stories, saying it is based on \u201cwrong assumptions and uncorroborated theories that raise serious doubts about the reliability and interests of sources.\u201d The company claimed that data given the group is \u201cbased on misleading interpretation of data from accessible and overt basic information, such as HLR Lookup services, which have no bearing on the list of the customer targets of Pegasus or any other NSO products.\u201d<\/p>\n<p>These services are available to anyone at any time and are commonly used by governments, they said.<\/p>\n<p>However, NSO Group has also been linked to other privacy scandals, including the hacking of Amazon founder Jeff Bezos and journalist Jamal Khashoggi, a U.S. resident murdered in the Saudi embassy in Turkey. Both incidents occurred in 2018. A year later Facebook sued the company in a case involving a zero-day vulnerability in WhatsApp that targeted devices used by journalists, political activists and others. Google, Microsoft and Cisco Systems filed briefs supporting the lawsuit.<\/p>\n<p>In 2020, the FBI began investigating the company for possibly spying on citizens and groups in the United States.<\/p>\n<h2>Spyware is Evolving<\/h2>\n<p>Researchers at Lookout, a endpoint-to-cloud security company, have watched Pegasus evolve since first spotting it in 2016, according to Chief Strategy Officer Aaron Cockerill.<\/p>\n<p>\u201cIt has advanced to the point of executing on the target\u2019s mobile device without requiring any interaction by the user, which means the operator only has to send the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> to the device,\u201d Cockerill told <em>eSecurity Planet<\/em>. \u201cConsidering the number of apps iOS and Android devices have with messaging functionality, this could be done through SMS, email, social media, third-party messaging, gaming or dating apps.\u201d<\/p>\n<p>There is a trend where techniques used by the likes of NSO Group are being adopted by consumer-grade surveillance software and spyware vendors, which could lead to such powerful tools being put in the hands of many people. This is similar to the trend toward <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\">ransomware-as-a-service<\/a>, which has made it possible for people with little experience to launch such attacks, he said.<\/p>\n<p>\u201cMobile devices continue to be a primary attack vector for cyber criminals,\u201d Cockerill said. \u201c<a href=\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/\">Mobile malware<\/a>, surveillanceware and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> can take down infrastructure and track our every move as attackers target individuals where they are most vulnerable.\u00a0Business executives with access to market data, technological research and infrastructure are highly valuable targets.\u201d<\/p>\n<p>As mobile devices like iOS and Android smartphones have become integral to daily life, \u201cthey need to be secured with as much \u2013 if not more \u2013 priority than any other device,\u201d he said. \u201cAs smartphones continue to evolve, security continues to improve.\u00a0However, so does the breadth and complexity of the existing software codebase, with millions of lines of code which need to be secured.\u201d<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-zero-trust-security-can-protect-against-ransomware\/\">How Zero Trust Security Can Protect Against Ransomware<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d7020ab7e75-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7020ab7e75\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7020ab7e75\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7020ab7e75\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7020ab7e75\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7020ab7e75\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7020ab7e75\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Reports that the NSO Group\u2019s Pegasus spyware was used by governments to spy on Apple iPhones used by journalists, activists, government officials and business executives is becoming a global controversy for NSO, Apple and a number of governments at the center of the scandal. Amnesty International and Forbidden Stories\u00a0\u2013 a Paris-based nonprofit media group that [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":18859,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[18],"tags":[555],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[403,396],"class_list":["post-18858","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile","tag-mobile-security","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-cyber-terrorists-and-cyber-crime","b2b_product-wireless-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Apple and NSO Group find themselves at the center of the biggest privacy scandal in years.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Apple and NSO Group find themselves at the center of the biggest privacy scandal in years.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-21T19:16:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-21T19:27:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/spyware-e1626895488701.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"626\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal\",\"datePublished\":\"2021-07-21T19:16:55+00:00\",\"dateModified\":\"2021-07-21T19:27:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/\"},\"wordCount\":1279,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/spyware-e1626895488701.jpg\",\"keywords\":[\"mobile security\"],\"articleSection\":[\"Mobile\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/\",\"name\":\"Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/spyware-e1626895488701.jpg\",\"datePublished\":\"2021-07-21T19:16:55+00:00\",\"dateModified\":\"2021-07-21T19:27:28+00:00\",\"description\":\"Apple and NSO Group find themselves at the center of the biggest privacy scandal in years.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/spyware-e1626895488701.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/spyware-e1626895488701.jpg\",\"width\":1200,\"height\":626,\"caption\":\"spyware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal | eSecurity Planet","description":"Apple and NSO Group find themselves at the center of the biggest privacy scandal in years.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/","og_locale":"en_US","og_type":"article","og_title":"Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal | eSecurity Planet","og_description":"Apple and NSO Group find themselves at the center of the biggest privacy scandal in years.","og_url":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/","og_site_name":"eSecurity Planet","article_published_time":"2021-07-21T19:16:55+00:00","article_modified_time":"2021-07-21T19:27:28+00:00","og_image":[{"width":1200,"height":626,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/spyware-e1626895488701.jpg","type":"image\/jpeg"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal","datePublished":"2021-07-21T19:16:55+00:00","dateModified":"2021-07-21T19:27:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/"},"wordCount":1279,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/spyware-e1626895488701.jpg","keywords":["mobile security"],"articleSection":["Mobile"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/","url":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/","name":"Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/spyware-e1626895488701.jpg","datePublished":"2021-07-21T19:16:55+00:00","dateModified":"2021-07-21T19:27:28+00:00","description":"Apple and NSO Group find themselves at the center of the biggest privacy scandal in years.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/spyware-e1626895488701.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/spyware-e1626895488701.jpg","width":1200,"height":626,"caption":"spyware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/mobile\/apple-security-nso-spyware-scandal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18858"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18858"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18858\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18859"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18858"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18858"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18858"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}