Featured
Google’s Elite Hacking Team Reveals Bug in iPhone

(Bloomberg) — On the same day Apple revealed the date for its latest iPhone event, Google’s privacy team said it had discovered a two-year-long vulnerability in the iPhone software.
Read: Apple Readies Camera-Focused Pro iPhones, New iPads, Larger MacBook Pro
The bug targeted a small number of websites. Simply visiting those pages could have left iPhone users susceptible to the breach and possibly affected thousands of users per week, Google Zero wrote in a number of blog posts on Thursday.
Visiting the unnamed sites allowed hackers to gain access to a plethora of information, including the ability to track movements via the phone’s GPS system, to obtaining passwords and being privy to sensitive conversations through iMessage and WhatsApp.
Read: How Android Rose Up to Challenge Apple
The report from Google came at the same time Apple announced the date for unveiling its next iPhones, and potentially a slew of other products. Earlier in August Apple’s top security engineer said the company would begin distributing special iPhones to researchers to help them discover flaws before malicious hackers do.
The bug-hunting hackers at Google reported the issue to Apple on Feb. 1 and, less than a week later, Apple updated its operating systems. Apple did not return a request for comment.
Google’s Project Zero is an elite unit of Alphabet Inc.’s Google, made up of cybersleuths who hunt for “zero day” vulnerabilities — unintended design flaws that can be exploited by hackers to break into computer systems.
“All that users can do is be conscious of the fact that mass exploitation still exists and behave accordingly,” Ian Beer, a Project Zero researcher, wrote in a blog post. “Treating their mobile devices as both integral to their modern lives, yet also as devices which when compromised, can upload their every action into a database to potentially be used against them.”
Read: Trump Says Apple’s Cook Concerned About Losing Edge to Samsung With Tariffs
Beer said attackers exploited fourteen different software flaws, including seven which targeted Safari, the Apple product’s built-in web browser. Through developing five distinct entry points, the cybercriminals could access various features on the phone, including those usually off-limits to users. This meant hackers could quietly install malware onto the device without the owner knowing.
A brightside is the bug isn’t persistent. Simply rebooting the device will wipe it clear, unless it is at risk again. However, Beer said hackers could continue having access to accounts they had passwords for even after they lost the ability to get new information from the phone.
-
OER Magazines1 month ago
OER, July 25
-
Alamaliktistaad Magazines1 month ago
Al-Iktisaad, July 25
-
Education2 months ago
Russia offers diverse tourism and education opportunities: Sofia Malyavina
-
Digital2 months ago
Russia’s Digital Frontier: An Inside Look with Alexey Goreslavsky of IRI
-
News1 month ago
OpenAI Strengthens ChatGPT’s Mental Health Safeguards Ahead of GPT-5 Launch
-
Banking & Finance2 months ago
Sohar International Partners as Main Sponsor for Refill 3, a Culinary and Cultural Festival Driving Tourism in Khareef Dhofar
-
Banking & Finance2 months ago
Tender results of Government Treasury Bills worth RO21.7 million issued
-
Energy1 month ago
SOHAR Port and Freezone Signs MoU to Develop Natural Hydrogen Value Chain in Oman
You must be logged in to post a comment Login