 you wondering what the Pegasus spyware software is about and how it works without getting into the technical jargons? Are you anxious about the safety of your data too? Watch this video to simply learn how it works and to what extent you can protect yourself. We use all kinds of apps be it WhatsApp, YouTube, gaming etc on our phones or depending on our operating system Android, iOS that are all vulnerable to bugs. Sophisticated softwares that make our lives simpler are very complex to develop. The or is human. It is natural that bugs or flaws are introduced without the knowledge of designers. But how do these bugs affect you? Bugs can be misused by attackers to access or acquire control of a software. The more the bugs the easier to hack that piece of software. Zero-day vulnerabilities are those that one hasn't seen before nor used it to attack before. There are serious underground markets called zero-day vulnerabilities. Locating harder or lesser known vulnerabilities fetches thousands and millions of dollars in these underground markets. And now the question arises that who are the buyers in such transactions? It could be criminal or government agencies like NSA, Massa or RAW for that matter. Or even the security firms. See the NSO group that created the Pegasus virus. Now how do attackers access your phone and multiple devices with the help of bugs? There are three most common methods. The simplest is to install a software by stealing your phone for a few minutes and then return it to you. But there are more sophisticated ways emerging. Two, you receive a message with a link for example a text or WhatsApp message or a mail that has a link. Clicking on that will run codes on your phone misusing zero-day vulnerabilities. Once the attackers access your device, they can read, copy your messages, turn on your microphone camera, record as well, corrupt or erase your data, steal bank passwords, remotely download all your chats, even send messages from your phone without your knowledge. You name it and they can do it all. Now you may refer to click on any link to prevent troubles but will that be enough? The answer is no and here is why. Zero-click attacks do not need user interaction. For example you may receive a text message and that's enough to begin the attack. The message may entail special text or an image triggering multiple bugs in the app or phone. Thus accessing full or partial control of your phone all without your knowledge leaving no traces behind. How does Pegasus work? Pegasus uses a combination of these methods. They started with installing softwares but has now moved to zero-click attacks. Zero-click attacks are even starting to target other parts of your phone. For example your Apple Music. What are the possible protection against those? One must be suspicious of messages and calls from unknown numbers. Keep your phone and all apps up to date. In spite of all your efforts, if a major player wants to hack your phone then even the likes of Jeff Bezos can't protect themselves. His phone too was hacked using similar methods and possibly using Pegasus. Only awareness can pressure companies to keep their software up to date and more secure.