New Delhi: Days after heated controversy around globe over Pegasus spyware allegedly tapping phones of human rights activists, journalists and even heads of state, Apple has detected a new zero-day, zero-click exploit called ‘FORCEDENTRY’ in Apple’s iMessage service, allegedly used by Israel’s NSO Group to install Pegasus spyware in devices including the iPhone, iPad, MacBook and Apple Watch. A team of researchers at Toronto-based Citizen Lab, who have been investigating Pegasus Spyware, found the problem while analysing a Saudi activist’s phone that had been compromised with the code. ALSO READ | Pegasus Project: Over 40 Journalists, 2 Ministers, 1 Judge, And 3 Oppn Leaders Were Alleged Targets According to media reports, the cybersecurity watchdog organisation in Canada, released a software update for a weakness that can let the spyware infect devices without users even clicking on a malicious message or link. The researchers have advised to update the operating systems on their Apple devices in order to avoid their smartphones and laptops getting affected till the update rolled out by Apple on Monday is installed. “We determined that the mercenary spyware company NSO Group used the vulnerability to remotely exploit and infect the latest Apple devices with the Pegasus spyware,”…