Mobiles

There are serious security flaws in Apple's iPhone, iPad, and Mac models; experts recommend updating your devices


By TechThop Team

Posted on: 20 Aug, 2022

A serious security vulnerability was discovered in Apple's iPhone, iPad, and Mac models, which could potentially allow attackers to take complete control of these devices.

Although Apple released two security reports on Wednesday, they didn't receive much attention outside of tech publications.

According to Apple, hackers could get 'full admin access' to the device. Intruders could then use the device's name to run software on it, said Rachel Tobac, CEO of SocialProof Security.

The iPhone 6s and later models; iPad models, including all iPad Pros and the iPad Air 2; and Mac computers running macOS Monterey have been recommended to be updated by security experts. It has been reported that some models of the iPod have also been affected by the flaw.

The first and second reports published by Apple did not state how, where, or by whom the vulnerability was discovered, nor did they report how it was fixed. A researcher who wished to remain anonymous was cited in every case.

The NSO Group, an Israeli spyware firm, has a long history of identifying these flaws and exploiting them in malware that infects targets' smartphones, steals their contents, and surveils them in real-time.

As a result of the Commerce Department's blacklisting of NSO Group, the company has been forced to shut down.

A large number of journalists, dissidents, and human rights activists are reported to have been targeted by the spyware used by the company in Europe, the Middle East, Africa, and Latin America.

There has been no technical analysis of the vulnerabilities that Apple has just patched, according to security researcher Will Strafach, who claims he has not seen any such analysis.

The company has previously acknowledged similar security flaws, Strafach estimated that there may have been a dozen of them over the last few years, and has stated that it is aware of reports that these security holes might have been exploited in the past.

For more stories like this

Explore our website

TAP FOR MORE