Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

Tag: Zero-Click / Interactionless Attacks

In the Zero-Click scenario no user interaction is required. Meaning, the attacker doesn’t need to send phishing messages; the exploit just works silently in the background. Short of not using a device, there is no way to prevent exploitation by a zero-click exploit; it’s a weapon against which there is no defense.
—Google Project Zero, “A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution”

A Zero-Click attack is an exploit that requires no user interaction to operate – that is to say, no key-presses or mouse clicks. FORCEDENTRY, discovered in 2021, is an example of a zero-click attack.
—Wikipedia, “Exploit (computer security) – Zero-click”

A Zero-Click / Interactionless Attack is one that victims don’t need to click a link or grant a permission for the hack to move forward.

Screenshots of Phishing SMSs reported to Citizen Lab in 2016
Articles / CyberSecurity

A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution

Based on our research and findings, we assess this to be one of the most technically sophisticated exploits we’ve ever seen, further demonstrating that the capabilities NSO provides rival those previously thought to be accessible to only a handful of nation states.

A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution Read More
Man using tablet to make a video call with other people at dusk - Photograph: Alistair Berg/Getty Images
Articles / CyberSecurity

‘Zero-Click’ Zoom Vulnerabilities Could Have Exposed Calls

The flaws are now fixed, but they speak to the growing concerns around interactionless attacks.

‘Zero-Click’ Zoom Vulnerabilities Could Have Exposed Calls Read More
people in a stadium on their phones - Photograph: Getty Images
Articles / CyberSecurity

Sneaky Zero-Click Attacks Are a Hidden Menace

Hacks that can play out without any user interaction may be more common than we realize, in part because they’re so difficult to detect.

Sneaky Zero-Click Attacks Are a Hidden Menace Read More
Man walking along cliff next to ocean while looking at phone - Photograph: Cavan Images/Getty Images
Articles / CyberSecurity

NSO Group Spyware Targeted Dozens of Reporters in El Salvador

The newly disclosed campaign shows how little the company has done to curb abuses of its powerful surveillance tools.

NSO Group Spyware Targeted Dozens of Reporters in El Salvador Read More
Exterior of NSO Group building - Photograph: Amir Levy/Getty Images
Articles / CyberSecurity

Google Warns That NSO Hacking Is On Par With Elite Nation-State Spies

ForcedEntry is “one of the most technically sophisticated exploits” Project Zero security researchers have ever seen.

Google Warns That NSO Hacking Is On Par With Elite Nation-State Spies Read More

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • How Bellingcat is using TikTok to investigate the war in Ukraine
  • Science Is Not Another Opinion
  • Informing California Privacy Regulations with Evidence from Research
  • What To Do About Deepfakes
  • Hacking Russia was off-limits. The Ukraine war made it a free-for-all
  • The Pegasus Project
  • How Democracies Spy on Their Citizens
  • Russia’s Sandworm Hackers Attempted a Third Blackout in Ukraine
  • How Russia’s Invasion Triggered a US Crackdown on Its Hackers
  • The Race to Archive Social Posts That May Prove Russian War Crimes

Reference

•    Dictionaries, Glossaries and Other Resources
•    Glossary of Terms (Tag Terms)
•    Links

Categories (Number of Articles in each)

  • — Broad Topics (518)
    • Climate (11)
    • Computing & Technology (244)
    • CyberSecurity (192)
    • Web Resources (38)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (35)
      • – WSU Resources (8)
    • Street Art (3)
  • — Form Types (502)
    • Articles (419)
    • Books, Reports, Films & Images (57)
    • News & Information (27)
    • Organizations (4)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (39)
  • Artificial Intelligence Research (5)
  • Avalanche Education (7)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (8)
  • Bellingcat (6)
  • China (24)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (9)
  • Computer Chip Manufacture (5)
  • Computer Crimes (5)
  • Computer Security (17)
  • Computing Education (9)
  • Coronavirus-Covid19 (10)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (16)
  • CyberSecurity (10)
  • CyberSecurity News (5)
  • Cyber Warfare (15)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (10)
  • Ethics (22)
  • Ethics of AI (12)
  • Facebook (11)
  • Geopolitics (9)
  • Government Policy (10)
  • Government Regulation (8)
  • Guidance (17)
  • Hackers & Hacking (29)
  • Hacking for Hire (8)
  • Historical (8)
  • History – Computing (11)
  • History – Internet (12)
  • History – Silicon Valley (6)
  • How To (6)
  • HTML (5)
  • Human Psychology (5)
  • Internet – Government Policy (7)
  • Internet Access (5)
  • Internet Censorship (10)
  • Internet Connectivity (5)
  • Internet of Things (IoT) (5)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (11)
  • Law & Policy (6)
  • Machine Learning (9)
  • Malware (9)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (14)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (11)
  • Open Source Intelligence (OSINT) (11)
  • Opinion & Perspective (5)
  • Passwords (7)
  • Pegasus (6)
  • Privacy (26)
  • Privacy & Data Protection (6)
  • Privacy & Personal Information (10)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (7)
  • Resources (5)
  • Russia (40)
  • Security (9)
  • Security Guidance (7)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (5)
  • Social Media (24)
  • Spyware (7)
  • Surveillance – Electronic (11)
  • Surveillance – Online (12)
  • Surveillance Capitalism (5)
  • Technological Achievement (8)
  • Technology & Society (7)
  • Technology Policy (6)
  • Ukraine (28)
  • Understanding Your World (6)
  • User eXperience (5)
  • Weather Phenomena (6)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (6)
  • Zero-Click / Interactionless Attacks (5)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi  is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-22 Wallace Web Design, LLC

 

Featured Books

Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
Book Cover - A New History of Modern Computing: How the computer became universal
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Book Cover - Hackers: Heroes of the Computer Revolution
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton
Book Cover - We Have Root: Even More Advice from Schneier on Security
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed.
Book Cover - Facebook: The Inside Story by Steven Levy
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America
Book Cover- Permanent Record
Book Cover - The Perfect Weapon
Book Cover - Dawn of the Code War
Book Cover - Zucked
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier
Copyright © 2020-2022 Wallace Web Design, LLC
Scroll to Top