Researchers trigger new exploit by renaming an iPhone and a Tesla | The Verge
Security researchers investigating the recently discovered and “extremely bad” Log4Shell exploit claim to have used it on devices as varied as iPhones and Tesla cars. Per screenshots shared online, changing the device name of an iPhone or Tesla to a special exploit string was enough to trigger a ping from Apple or Tesla servers, indicating that the server at the other end was vulnerable to Log4Shell.
#technology #tech #security #privacy #hacking #malware #phishing #Log4Shell #log4j
4 Likes
1 Comments
2 Shares