May 29, 2021

Stealing keychain via .ics attachment?

Part of my employer’s annual training is “Kevin Mitnick Security Awareness Training”.

During the presentation, he gives an example in which a person clicking an .ics attachment and adding an event to their calendar automatically emails the Apple keychain to the hacker.

I can’t find any details on how this actually works. Anyone have any more info?

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.