{"id":856265,"date":"2024-09-17T10:59:20","date_gmt":"2024-09-17T05:29:20","guid":{"rendered":"https:\/\/telecomlive.in\/web\/?p=856265"},"modified":"2024-09-17T10:59:20","modified_gmt":"2024-09-17T05:29:20","slug":"how-hackers-are-using-apple-vision-pros-eye-tracking-technology-to-steal-passwords","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2024\/09\/17\/how-hackers-are-using-apple-vision-pros-eye-tracking-technology-to-steal-passwords\/","title":{"rendered":"How hackers are using Apple Vision Pro&#8217;s eye-tracking technology to steal passwords"},"content":{"rendered":"<p>Apple Vision Pro\u2019s eye-tracking technology introduces a new way to interact while typing. However, hackers are reportedly exploiting this technology to steal sensitive data. This new technology available in Apple\u2019s first-ever mixed reality headset comes with a vulnerability called GAZEploit. This flaw developed by researchers from the University of Florida, CertiK Skyfall Team, and Texas Tech University puts users at risk of privacy breaches during Apple Vision Pro FaceTime calls. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple Vision Pro\u2019s eye-tracking technology introduces a new way to interact while typing. However, hackers are reportedly exploiting this technology to steal sensitive data. This new technology available in Apple\u2019s first-ever mixed reality headset comes with a vulnerability called GAZEploit. This flaw developed by researchers from the University of Florida, CertiK Skyfall Team, and Texas Tech University puts users at risk of privacy breaches during Apple Vision Pro FaceTime calls.<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[87,4,11],"tags":[],"class_list":["post-856265","post","type-post","status-publish","format-standard","hentry","category-it-2-the-times-of-india","category-newspapers","category-the-times-of-india"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/856265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=856265"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/856265\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=856265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=856265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=856265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}