Breaking News

Apple’s vulnerability iOS exposes the iPhoney concealed hacker attacks


Generally, iPhone is considered safer than Android devices.

Apple’s closed ecosystem and strict trade rules of the App Store limit the risk of malicious software, and its centralized software updates ensure better security. In contrast, the Android openness allows users to install applications from different sources, and updates often develop at different times, making it more vulnerable to attacks.

However, the iPhones are not immune to safety deficiencies. Hackers occasionally find ways To use them, as seen in Apple’s latest counseling. The company recently revealed that vulnerability in iOS has been used for more than a year. Although the repair has now been published, reports suggest that hackers may have already been aiming for high -value individuals.

Get security warnings, experts – sign up for Kurtov Bulletin – Cyberguy Report HERE

A woman on her iPhone. (Kurt “Cyberguy” Knutsson)

What you need to know

Apple has discovered Hackers that exploit vulnerability to iOS that it seems to be retained for over a year. Vulnerability is a disadvantage of “zero day”, which means that criminals may have already used it, according to the latest safety consultation of the company. Such models are especially dangerous because they are exploited before developers can issue repairs. Apple confirmed that this was its first zero patch since 2025. Vulnerability affects the iPhone devices dating from the XS model in 2018, as well as new iPada, macs and even the headset of Vision Pro.

Vulnerability, followed as a Cve-2025-24085, is located in Apple’s basic media frame Software layer responsible for processing multimedia files. The “use of use after free” corruption error enabled the hackers to manipulate the system in the execution of the unstable code, giving them elevated privileges to bypass the security protocols. The Apple Advisor suggests that hackers are armed with flaws through malicious applications disguised as legitimate media players. These applications probably abused the basic media box by launching damaged files, allowing attackers to infiltrate devices.

The attacks were allegedly targeting the IOOS versions that predicted 17.2, published in December 2023, which means that vulnerability may been active since the end of 2022. Safety experts speculate that the hackers focused on individuals of high values-after activists, executives or journalists-how to avoid discovering. The long -term concealment of the campaign emphasizes the challenges of identifying sophisticated, closely adapted features.

This emphasizes the critical need to update your appliances to iOS 17.2 or more recent, as these versions include basic corrections for protection against this actively exploited vulnerability.

Apple’s IOS 17.2 update included patches for several vulnerability. (Kurt “Cyberguy” Knutsson)

How to protect your iPhone and iPad from malicious software

Apple’s response to vulnerability

In response, Apple posted repairs in his ecosystem, including IOS 18.3, Macos Sequoi, Watchos, Your Visionos and Visionos. You need to update your devices as soon as possible to be protected. To install an update on an iPhone or iPad:

  • Go Settings.
  • Tap General.
  • Click Software update.
  • Click Update now or Update tonight.

Pro Tip: I recommend that you click Update now and also turn on Automatic updates stay covered in the future.

What is artificial intelligence (AI)?

Steps to update software on the iPhone. (Kurt “Cyberguy” Knutsson)

Although the Apple patch this problem, the reminder is that it is crucial to staying on top of the update. Hackers are always looking for security flaws so updating your software is one of the best ways to be safe.

Fraudsters found a cunning way of bypassing your iPhone security features

7 ways to keep your iPhone

The protection of your iPhone requires proactive security measures. Following these seven essential steps, you can significantly reduce the risk of cyber threats and protect your personal information.

1. The iPhone update: I can’t say this enough. Update your iPhone It is regularly one of the most effective ways of protection against security threats. Apple often publishes updates that repair vulnerability, including critical defects in days.

2. Download applications only from the App Store: To reduce the risk of installing malicious software, just download applications from the official App Store. Apple’s strict review process application helps prevent the publication of malicious applications, but some threats can still pass. Always check the app details, check reviews and be careful about applies for applications before installation.

3. Allow the locking method for additional protection: For those of you who may be exposed to greater risk, such as a journalist or manager, Locking method Provides an additional layer of security. This feature limits certain functionality of the device to prevent sophisticated cyber attacks. Can be switched on through Settings > Privacy and security > Locking method and is especially useful for those who are concerned about the target threats.

4. Allow messages to filter: Use built -in filtering capabilities to sort messages from unknown sender. This feature allows you to automatically sort messages from unknown sender, easily filters unproven messages and more efficiently managed by a received message. Here’s a step:

  • Open Settings.
  • Move down and click Apps.
  • Tap Messages.
  • Include Filter unknown sender

Get a job with Fox on a clicking movement here

5. Stay careful for phishing attacks and install strong antivirus software: Phishing It remains one of the most common tactics used by hackers. Be careful when receiving unwanted messages or E -hast on your iPhone, especially those with suspicious relationships or attachments. Always check the sender before you open anything. The best way to protect yourself from malicious connections installed by malicious software, potentially access to private data, is to install antiviral software on all your devices. This protection can also alert you of phishing e -Mail and fraud from Ransomware, keeping your personal information and digital assets. Get my elections for the best winners to protect against antivirus 2025 for your Windows, Mac, Android and iOS devices.

6. Review your safety and privacy settings: Regularly reviewing your iPhone security settings can help maintain strong protection. You should also review the application licenses in Settings> Privacy and Safety limit access to sensitive data, such as location or contacts. Enable Face ID or touch ID For a safe approach and include a dual -factor authentication (2fa) for Apple ID and other accounts. 2fa Adds an additional layer of security to your accounts, demanding another form of check, such as an application for a text message or authentication, in addition to your password. This significantly reduces the risk of unauthorized approach, even if your password is threatened.

7. Invest in personal data removal services: By reducing your web print, Cyber ​​-Christimal people make it difficult to get your contact data, which potentially prevents them from sending you with deceptive IE -Poruke texts first. Although no service promises to remove all your information from the Internet, the removal service is great if you want to constantly monitor and automate the process of removing your data from hundreds of sites continuously over a long period of time. See my best selection here for data removal services.

Kurt’s key step

This vulnerability iOS is a serious reminder of the importance of staying software update. If you use the 2018 or later, make sure you updated to you to update at iOS 17.2 or later. The hackers used the hidden flaw for over a year, using false media applications to get access to devices. Although Apple has now patients the problem, the fact that it has remained undiscovered for so long.

Click here to get the Fox News app

Do you think companies like Apple do enough to protect you from cyber threats? Let us know by writing us on Cyberguy.com/contact

For more of my technological tips and security warnings, subscribe to my free newsletter about Cyberguy Report, moving toward Cyberguy.com/newslettter

Ask the Kurt question or let us know which stories would you like to cover.

Follow Kurt on his social channels:

Answer to Cyberguya’s most needed questions:

New from Kurt:

Copyright 2025 Cyberguy.com. All rights reserved.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
Social Media Auto Publish Powered By : XYZScripts.com