Earlier this year, Apple corrected one of the most exciting security holes ever, and it was a memory file bug in the iOS kernel through which it was possible to remotely access the contents of the entire device, via Wi-Fi, without the need. To user intervention. These vulnerabilities could spread quickly, with little to no user involvement. Last Tuesday, another dangerous and similar vulnerability was announced through which the entire contents of the device can be accessed without the user feeling anything. Learn what this vulnerability is and how I protect myself from it.

A vulnerability has been discovered in iOS that allows hackers to access the entire contents of your device


Ian Beer, a member of the Project Zero team at Google, discovered a security flaw in the technology used to enable wireless connectivity features, specifically in a component called AWDL short for "Apple Wireless Direct Link", a protocol used in iPhones, iPads and Macs, which is the technology that It allows peer-to-peer communication between Apple devices, such as AirDrop to quickly transfer files to other devices, and Sidecar to "quickly turn an iPad into a secondary screen", this vulnerability allows hackers to access photos, emails and messages on iOS devices without the user notifying it. Beer posted the news earlier on Twitter saying he had been working on the project since the start of the year.

And surprisingly, Beer not only discovered an infiltration vulnerability but also found a way to force AWDL to run even if it was stopped.

Bear pointed out that this kind of exploitation, if it fell into the wrong hands, could endanger privacy on a massive scale.

Beer says it hasn't found any evidence that this vulnerability is actually used by other people. He asks to work with Apple to fix the problem through the Bug Bounty program and said that he will donate any money he gets from the program to charities.

Apple is expected to team up with Beer and work on several security updates associated with the vulnerability. But Apple indicates that most iOS users are using newer versions of iOS that have been corrected and addressed such problems, and indicates that the hacker will need to be within Wi-Fi range in order to be able to infiltrate and hack. Therefore, it is always recommended to update our devices to the latest version so that we are safe from these risks.

Watch the video and how to control more than one iPhone remotely simultaneously:

Before you get worried, the Google Project Zero team detects vulnerabilities and informs companies about them, and these vulnerabilities are actually closed; Then the team announces the vulnerability; This means that if you are on the latest version of the systems "whatever the type of system", then this means that the vulnerabilities announced by the team have been closed on your device and you are safe from them. But if you do not like the upgrade and prefer the older systems, unfortunately the vulnerabilities are often present in your device.

What do you think of this report? Do you think that Apple is oblivious to such vulnerabilities? Let us know in the comments.

Source:

more

Related articles