[ad_1]
A Google researcher has taken advantage of an iPhone vulnerability that has since been fixed that allowed hackers to control any iPhone within WiFi range.
Ian Beer, a security researcher for Google’s vulnerability detection initiative Project Zero, said in a Monday blog post that he spent six months of 2020 trying to uncover an exploit in which he was able to “get complete control over any iPhone “in your neighborhood.
Heart | Security | Latest | Change | Change% |
---|---|---|---|---|
AAPL | APPLE INC. | 122.90 | -0.18 | -0.15% |
GOOGL | ALPHABET INC. | 1,832.25 | +7.28 | + 0.40% |
Apple confirmed to FOX Business that the issue was fixed before the company released iOS 13.5 in May, which included a contact tracing feature for COVID-19.
“This issue was fixed in May with iOS 13.5 and the vast majority of our users keep their software up-to-date, as you can see here from the data released at the time it was patched,” said an Apple spokesperson. “The other point to keep in mind is that this requires some proximity, as it must be within range of WiFi. Hope this is helpful.”
RARE APPLE 1, SIGNED BY STEVE WOZNIAK, COULD VALUE $ 400G
Beer said he has no evidence that the vulnerabilities he found were “exploited in the wild.” However, research like yours prevents those problems from allowing future hackers to take advantage of people’s devices and access personal information.
“The bottom line of this project shouldn’t be: No one will spend six months of their life just hacking my phone, I’m fine,” Beer wrote. “Instead, it should be: one person, working alone in their bedroom, was able to develop a capability that would allow them to seriously engage iPhone users with whom they had been in close contact.”
The sophisticated teams of hackers and “companies that supply the global cyber arms trade … are not usually just people working alone,” unlike what it was when he discovered the exploit, Beer noted.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
“They are well-focused and well-resourced teams of expert collaborators, each with their own expertise,” he wrote. “They don’t start out without the slightest idea of how Bluetooth or WiFi works. They also have access to information and hardware that I just don’t have, like development devices, special cables, leaked source code, symbol files, etc.”
In conclusion, Beer said in part that there must be a “renewed focus on vulnerability discovery”, which means “not just more variant analysis, but a lot of dedicated effort to understand how attackers really work and beat them at their own game. by doing what they do best. “
CLICK HERE TO READ MORE ABOUT FOX BUSINESS