• HOME GARDENING
  • LIFESTYLE
  • OUTDOOR
  • FASHION
  • AUTO CAR
  • OTHER
    • TECH
    • FOOD
    • BUSINESS
    • HEALTH
    • ENTERTAINMENT
    • EDUCATION
    • SEO DIGITAL
    • WRITE FOR US

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Thinking of Contracting Cybersecurity Software? Here’s What You Need to Know

June 27, 2025

The Smart Shopper’s Guide to Compact SUVs: What to Know Before Buying

June 23, 2025

Transform Your Space with Quality Cleaning Services in Boston

June 18, 2025
Facebook Twitter Instagram
BARBARAIWEINS
  • HOME GARDENING
  • LIFESTYLE
  • OUTDOOR
  • FASHION
  • AUTO CAR
  • OTHER
    • TECH
    • FOOD
    • BUSINESS
    • HEALTH
    • ENTERTAINMENT
    • EDUCATION
    • SEO DIGITAL
    • WRITE FOR US
Facebook Twitter Instagram
BARBARAIWEINS
Home»TECH»Update immediately! Serious bug allows iPhone transfer via SMS
Serious bug allows iPhone transfer via SMS
TECH

Update immediately! Serious bug allows iPhone transfer via SMS

By Tomer JackFebruary 1, 2021Updated:February 1, 2021No Comments3 Mins Read
Share
Facebook Twitter Pinterest Reddit WhatsApp Email

The iPhone is actually considered very secure. However, a hacker has now discovered six bugs that allow the device to be taken over remotely. One of the gaps has still not been closed. It is a real selling point for many: While users of Android devices have to deal with malware and antivirus programs, the iPhone is considered a very secure and carefree alternative. But now six serious bugs have been discovered in iOS – and one is still not fixed.

The gaps were found by a Google employee of all people. However, 4besnews there is no nasty competition from the company behind Android. Security expert Natalie Silvanovich works for Project Zero, which was commissioned by Google to find security holes in all kinds of devices and systems to make the network more secure. Silvanovich will present the vulnerabilities in detail at the Black Hat hacker conference next week.

The details that have already become known are scary: According to Silvanovich, all six gaps should allow remote access to the data on the device. And this without requiring any user interaction. In four of the cases, Apple’s SMS replacement iMessage is used for this purpose. Due to a flaw, it is sufficient to receive and open a manipulated SMS to give the attacker remote control over the device. F9news the two remaining flaws are also – unlike many popular attack methods such as Trojans – not dependent on user error.

They exploit a gap in the iPhone’s memory management to make the device’s data remotely readable. As befits a well-meaning hacker, Silvanovich has long since reported the errors to Apple. And the company has reacted: With the release of iOS 12.4 last week, Apple has fixed five of the bugs. So if you haven’t done so yet, you should definitely update your system to the latest version.

And as soon as possible: With the update, the hacker had also revealed the exact functionality of the plugged gaps and even explained in detail how to reproduce the error. So it’s probably only a matter of time before hackers actively attack the gap. However, one of the gaps is still open, Silvanovich explained to “ZDNet”. Unlike the bugs that have already been fixed, Silvanovich has not yet revealed any details about the gap. Nevertheless Apple should hurry with the repair: Errors like the ones just discovered are sometimes traded on the black market at prices over a million dollars, according to ZDNet. Users cannot understand whether they are affected by the hack.

The good news: The hack did not survive a restart – so the affected iPhones are not permanently in the hands of the hackers. And: With the update to iOS 12.1.4 the gap was already closed in February. This means that anyone who keeps their iPhone and iPad up-to-date is safe from the known methods of attack long before they are used. For Apple, the news is still a problem. For years, the iPhone was considered virtually unbreakable compared to Android devices.

The fact that not one, but five methods of taking full control are now becoming known, is likely to have a major impact on this image. Apple itself has not yet commented on this, press inquiries were rejected. But at least the reaction to the revelation gives hope: Not even a week passed from Google’s first report of the problem to the closing of the gap.

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleHow to Change Netflix Region on a Streaming Device
Next Article Samsung’s new leader Galaxy S cell phone works with its pointer unexpectedly.

Related Posts

Thinking of Contracting Cybersecurity Software? Here’s What You Need to Know

June 27, 2025

Maximise your long-term investment strategy with an SIP calculator for 25 years

January 21, 2025

How Can SMEs Adopt Industry 4.0 Technologies?

December 3, 2024

How Blockchain Can Transform the Public Sector

October 14, 2024

The Ultimate 5: Navigating the Best Factory Outlet Wholesale Clothing Deals

November 2, 2024

Top 6 Blank Apparel Wholesale Distributors: Where to Source Quality Clothing in Bulk

November 2, 2024

Comments are closed.

Our Picks
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Don't Miss
TECH

Thinking of Contracting Cybersecurity Software? Here’s What You Need to Know

By Tomer JackJune 27, 2025

If you’re running a business today, your data is your lifeblood—and the threats to it…

The Smart Shopper’s Guide to Compact SUVs: What to Know Before Buying

June 23, 2025

Transform Your Space with Quality Cleaning Services in Boston

June 18, 2025

Top 10 Mistakes First-Time Triathletes Make (and How to Avoid Them)

May 28, 2025

Subscribe to Updates

Get the latest creative news from SmartMag about art & design.

Facebook Twitter Instagram Pinterest
© 2025 Barbaraiweins. Write For Us: info@barbaraiweins.com.

Type above and press Enter to search. Press Esc to cancel.