CAREFUL! ANY iPhone CAN BE BREAKED SO SIMPLE

Time 14/03/2022 By myhoneybakedfeedback

Any Apple iPhone can be broken due to extremely dangerous vulnerabilities that allow hackers to even take control of Cupertino phones. We are talking about a number of vulnerabilities that exist in the Messages, Messages, iPhone application, and we talked about them a few weeks ago when I told you that some have been blocked in iOS 12.4 by Apple, but some are still active , Unfortunately.

At a Black Hat conference in the United States yesterday, a computer security researcher demonstrated how easily Apple phones can be broken with simple text messages sent to them. It is enough for the user to open the Messages application for the hack to be done, and from there the phone can be fully controlled remotely, without the user knowing what is happening, or what data is accessed or stolen.

ATTENTION! ANY iPhone CAN BE BREAKED SO SIMPLE

The vulnerabilities are in the iMessage system on the iPhone, and the vulnerabilities are so severe that iPhone users may have messages, or even pictures, extracted by hackers remotely. The researcher who discovered these vulnerabilities is working for Google, in a team called "Project Zero", they revealed the problems to Apple a few months ago, but not all of them have been solved yet.

ATENTIE! ORICE iPhone Poate fi SPART chiar Atat de SIMPLU

"These can be turned into a kind of bug that will execute the code and can eventually be used for armed things like accessing your data. So the worst case scenario is that these vulnerabilities are used to harm users. An attacker could send a specially crafted text message to a target, and the iMessage server would send user-specific data back, such as the contents of its SMS messages or images. "

The iPhone is presented by Apple as a phone that offers the highest level of security for customers, but apparently only if the iMessage platform is not used for communication with other people. If iMessage is enabled, then hackers can attack iPhones to hack and extract data from them, or run unsigned code and control many aspects of Apple's iOS operating system.

Unfortunately, there are no ways to protect against this type of attack, and we just have to wait for Apple to fix its problems to give us the level of security it keeps promising.