Cyber security news for all

More

    The Biggest Security Nightmare For iPhone

    It sounds like a nightmare for hundreds of millions iPhone users. All iPhone devices that came on the market between 2011 and 2018 have a critical security problem. The vulnerability opens a gateway for hackers, intelligence agencies and criminals.

    In such cases, Apple usually publishes an update in a timely manner that closes the gap. Different iPhone models will remain vulnerable forever. Many IT security researchers reacted to this case.

    iPhone security

    Which Devices Are Affected?

    The exploit can be carried out on seven chip generations from A5 to A11. These processors can be found in iPhones, iPads, iPods and Apple’s TV boxes. A total of eleven iPhone models are vulnerable, starting with the iPhone 4S. The iPhone X is still at risk, even Apple’s new iOS 13 operating system does not close the gap. Only devices with an A12 or A13 chip are safe- and all models of the 11 series. At least a majority of the affected iPhones have a security function that limits the damage. Sensitive information such as passwords and biometric data are stored in encrypted form on this secure part of the processor.

    No Protection Option Through Update

    The vulnerability is so problematic because it cannot be closed by an update as usual. It is not in the software, but in the chipset: This is a hardware component that controls the processor. To fix the error, Apple would have to call back the affected devices and replace the faulty component. Whether this will happen is completely open at the moment.

    Attack Only Via USB

    There is no immediate threat to normal, less exposed users. Firstly, access via the Internet is not possible; this requires direct access to the device via USB. Second, unlocking is not permanent; the third-party software is lost when you restart. And thirdly, the data on the device is protected by Apple’s security measures. Mails, messages and pictures are encrypted and cannot be read even on a broken device. Decryption requires the passcode that is used to unlock the phone or iPad. Without this, data theft occurs indirectly.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]