iPhones Are Vulnerable For Years – Google

iPhone Surveillance

Cyber Criminals can exploit Your iPhone through Zero Day Vulnerability.

According to latest security research, the bug allowed to steal copies of your private photos and access your contact lists, GPS tracking. It also downloads the conversation in apps like WhatsApp, iMessage, Hangouts and Telegram. Even your iPhone become malicious after visit a website.

“There was no target discrimination, simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant. We estimate that these sites receive thousands of visitors per week, said Google security researcher, Ian Beer, Project Zero.”

What is in Research?

"Google's Threat Analysis Group (TAG) was able to collect five separate, complete and unique iPhone exploit chains, covering almost every version from iOS 10 through to the latest version of iOS 12. This indicated a group making a sustained effort to hack the users of iPhone's in certain communities over a period of at least two years.

Researchers discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. Initial analysis indicated that at least one of the privilege escalation chains was still 0-day and unpatched at the time of discovery (CVE-2019-7287 & CVE-2019-7286)."

Apple Explains?

Google said that the Bug notified to Apple on 1 Feb 2019.

Apple said, we have Patched the vulnerability after six days.

Also See- iPhone Contacts App Vulnerable To SQLite Hack

“Keeping your software up to date is one of the most important things you can do to maintain your Apple product’s security,” Apple’s support page explains.

Many iPhone owners are still vulnerable to hack.

How to keep Protect?

You need to update your iPhone with latest iOS Version

  • Connect to Wi-Fi
  • Tap Settings > General > Software Update
  • Tap ‘Download and Install’
  • Tap ‘Install’ to update immediately, or tap ‘Later’
  • Done

Join Our Club

Enter your Email address to receive notifications | Join over Million Followers

Leave a Reply
Previous Article
Information Leaked

How Can Information Leakage Happen in Organisation?

Next Article
Jack Dorsey Twitter Hacked

Twitter CEO Jack Dorsey Account Hacked

Related Posts