{"id":49613,"date":"2022-08-19T00:50:45","date_gmt":"2022-08-19T00:50:45","guid":{"rendered":"https:\/\/harchi90.com\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices-apple\/"},"modified":"2022-08-19T00:50:45","modified_gmt":"2022-08-19T00:50:45","slug":"apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices-apple","status":"publish","type":"post","link":"https:\/\/harchi90.com\/apple-security-flaw-actively-exploited-by-hackers-to-fully-control-devices-apple\/","title":{"rendered":"Apple security flaw ‘actively exploited’ by hackers to fully control devices | apple"},"content":{"rendered":"
\n

Apple disclosed serious security vulnerabilities for iPhones, iPads and Macs that could potentially allow attackers to take complete control of these devices on Wednesday.<\/p>\n

The company said it is \u201caware of a report that this issue may have been actively exploited\u201d.<\/p>\n

<\/figure>\n

Apple released two security reports about the issue on Wednesday, although they didn’t receive wide attention outside of tech publications.<\/p>\n

Security experts have advised users to update affected devices \u2013 the iPhones 6S and later models; several models of the iPad, including the fifth generation and later, all iPad Pro models and the iPad Air 2; and Mac computers running MacOS Monterey. It also affects some iPod models.<\/p>\n

Apple’s explanation of the vulnerability means a hacker could get \u201cfull admin access to the device\u201d so that they can \u201cexecute any code as if they are you, the user,\u201d said Rachel Tobac, CEO of SocialProof Security.<\/p>\n

Those who should be particularly attentive to updating their software are \u201cpeople who are in the public eye\u201d such as activists or journalists who might be the targets of sophisticated nation-state spying, Tobac said.<\/p>\n

The company did not give specifics on how many users were affected by the vulnerability. In all cases, it cited an anonymous researcher.<\/p>\n

Commercial spyware companies such as Israel’s NSO Group are known for identifying and taking advantage of such flaws, exploiting them in malware that surreptitiously infects targets’ smartphones, siphons their contents and surveils the targets in real time.<\/p>\n

NSO Group has been blacklisted by the US commerce department. Its spyware is known to have been used in Europe, the Middle East, Africa and Latin America against journalists, dissidents and human rights activists.<\/p>\n

Security researcher Will Strafach said he had seen no technical analysis of the vulnerabilities that Apple has just patched. The company has previously acknowledged similarly serious flaws and, in what Strafach estimated to be perhaps a dozen occasions, has noted that it was aware of reports that such security holes had been exploited. <\/strong><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

Apple disclosed serious security vulnerabilities for iPhones, iPads and Macs that could potentially allow attackers to take complete control of these devices on Wednesday. The company said it is \u201caware of a report that this issue may have been actively exploited\u201d. Apple released two security reports about the issue on Wednesday, although they didn’t receive …<\/p>\n

Apple security flaw ‘actively exploited’ by hackers to fully control devices | apple<\/span> Read More »<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[4],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":48588,"url":"https:\/\/harchi90.com\/ios-15-6-1-fixes-two-security-vulnerabilities-that-were-actively-exploited-in-the-wild\/","url_meta":{"origin":49613,"position":0},"title":"iOS 15.6.1 fixes two security vulnerabilities that were actively exploited in the wild","date":"August 18, 2022","format":false,"excerpt":"Apple released iOS 15.6.1 to iPhone and iPad users this afternoon. The initial release notes did not specify what exactly had changed, other than Apple saying the update \u201cprovides important security updates and is recommended for all users.\u201d Apple has now updated its security updates webpage with the full details\u2026","rel":"","context":"In "Technology"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":48459,"url":"https:\/\/harchi90.com\/new-macos-12-5-1-and-ios-15-6-1-updates-patch-actively-exploited-vulnerabilities\/","url_meta":{"origin":49613,"position":1},"title":"New macOS 12.5.1 and iOS 15.6.1 updates patch \u201cactively exploited\u201d vulnerabilities","date":"August 17, 2022","format":false,"excerpt":"Apple has released a trio of operating system updates to patch security vulnerabilities that it says \"may have been actively exploited.\" The macOS 12.5.1, iOS 15.6.1, and iPadOS 15.6.1 updates are available for download now and should be installed as soon as possible. The three updates all fix the same\u2026","rel":"","context":"In "Technology"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6570,"url":"https:\/\/harchi90.com\/apple-says-lockdown-mode-in-ios-16-will-help-block-government-spyware-attacks-techcrunch\/","url_meta":{"origin":49613,"position":2},"title":"Apple says Lockdown Mode in iOS 16 will help block government spyware attacks \u2013 TechCrunch","date":"July 6, 2022","format":false,"excerpt":"Apple said Wednesday it will bring a new \u201cLockdown Mode\u201d to its upcoming iPhone and Mac software that will switch off certain features aimed at helping targeted individuals combat government-grade spyware. The technology giant said the new feature is an \u201cextreme optional protection\u201d for device owners who are more likely\u2026","rel":"","context":"In "Technology"","img":{"alt_text":"A screenshot showing iOS Lockdown Mode in iOS 16.","src":"https:\/\/i0.wp.com\/techcrunch.com\/wp-content\/uploads\/2022\/07\/lockdown-mode.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":49547,"url":"https:\/\/harchi90.com\/apple-discloses-serious-security-vulnerabilities-for-iphones-ipads-and-macs-science-tech-news\/","url_meta":{"origin":49613,"position":3},"title":"Apple discloses serious security vulnerabilities for iPhones, iPads and Macs | Science & Tech News","date":"August 18, 2022","format":false,"excerpt":"Apple has disclosed serious security vulnerabilities for iPhones, iPads and Macs, which could potentially allow attackers to take complete control of devices.Apple added that it is \"aware of a report that this issue may have been actively exploited\". Security experts have advised users to urgently update affected devices - the\u2026","rel":"","context":"In "Technology"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":49425,"url":"https:\/\/harchi90.com\/apple-patches-double-zero-day-in-browser-and-kernel-update-now-naked-security\/","url_meta":{"origin":49613,"position":4},"title":"Apple patches double zero-day in browser and kernel \u2013 update now! \u2013 Naked Security","date":"August 18, 2022","format":false,"excerpt":"Apple just pushed out an emergency update for two zero-day bugs that are apparently actively being exploited. There's a remote code execution hole (RCE) dubbed CVE-2022-32893 in Apple's HTML rendering software (WebKit), by means of which a booby trapped web page can trick iPhones, iPads and Macs into running unauthorised\u2026","rel":"","context":"In "Technology"","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"fifu_image_url":"https:\/\/i.guim.co.uk\/img\/media\/b68929a5949e97740fd2a87f13c16f43e62ee71c\/0_159_1960_1176\/master\/1960.jpg?width=1200&height=630&quality=85&auto=format&fit=crop&overlay-align=bottom,left&overlay-width=100p&overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&enable=upscale&s=84d0e2900543e123c36957197837ea20","_links":{"self":[{"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/posts\/49613"}],"collection":[{"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/comments?post=49613"}],"version-history":[{"count":0,"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/posts\/49613\/revisions"}],"wp:attachment":[{"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/media?parent=49613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/categories?post=49613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/harchi90.com\/wp-json\/wp\/v2\/tags?post=49613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}