By coupling the OS exploit within the ones found in the Safari application, hackers gained the ability to remotely open the mobile browser, install malware, and take complete control over the device. And although this alone is enough to raise concern, hacking groups took their actions further when continuing their attacks with the two bugs stemming from Safari.
While Apple has yet to release information on how hackers are able to gain access to the core OS of iPhones and iPads, it’s clear that this first step in the exploitation process gave hackers absolutely all the data stored on the victim’s device.
But what happens when hackers look past specific apps and specifically target the core OS of Apple’s mobile devices? What Does the iOS 14.4 Update Fix?Īs mentioned previously, this most recent exploit relied on the cohesive use of three bugs: one deeply ingrained in the core infrastructure of older OS files and two others found within Apple’s widely popular Safari browser. What this means is that one app cannot access data from another app, nor can it gain access to critical files held within the iPhone’s operating system. Once an iPhone app is downloaded and launched, it runs in a “sandbox” that is completely separate from all other applications. It relies entirely on a series of approved apps that are downloaded from Apple’s proprietary App Store.
Take, for example, the iPhone’s ecosystem. What Makes iPhones Secure?įor years, Apple engineers have worked to create a platform that balances security and usability with little to no effort placed on the shoulders of iPhone owners. But before diving into what you should be doing to protect your Apple devices and the data stored inside, let’s first take a look at why these exploits pose such a risk. While Apple has yet to provide full details on the extent of the attack, the tech giant did confirm that these vulnerabilities have already begun to be exploited by hacking organizations.
On January 26, 2021, Apple published patch notes that provided insight into three software vulnerabilities that, when daisy-chained together, could give hackers complete control over iPhones and iPads running iOS 14.3 or older. For many individuals, the iPhone’s accessibility and powerful hardware make it an easy choice for conducting business, viewing finances, and storing personal data on the go.īut with such wide-spread popularity, Apple has made itself a target for hacking groups looking to crack the codes behind one of the tech industry’s most secure devices.