ATTACKERS CAN HIJACK YOUR IPHONE SILENTLY WITH THIS VULNERABILITY. MORE DANGEROUS THAN YOU THINK!

Completing its benchmark of 1 billion sales across the globe, Apple devices are always among on top of the best devices that are known to provide the ultimate privacy and keep its users up to date about security-related issues. These devices are sometimes also called hack-proof because either they are very difficult to hack or they require extensive knowledge of hardware underlying its devices to explore the bug and exploit it.

From the last decade, be it any industry of entertainment across the globe, the scenario of hacking is shown as a hot cream (with 3–4 consoles running simultaneously and a person is hacking or taking the control of the device remotely). But, it is regretful to say that only the persons who actually know the target device can only understand the prerequisites to make it happen. Just like the size of all the fingers are not equal, each device has not the same vulnerability and if the same vulnerability does exist, it may have a different architecture or hardware designs.

Recently, a researcher from the GoogleProjectZero team named Ian Beer has found a vulnerability in one of the main Apple core functions that allow an attacker to take control of a particular device remotely but should be in the required vicinity. Let’s learn about vulnerability and its exploitation.

To continue reading, click here.

--

--

Debuggers covering infosec news,cyber security tutorials, data breaches, malware, threat analysis, ethical hacking, bugs, vulnerabilities and much more.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ethical Debuggers

Debuggers covering infosec news,cyber security tutorials, data breaches, malware, threat analysis, ethical hacking, bugs, vulnerabilities and much more.