VRB News
Virtual Reality Brisbane
  • Home
  • About us
  • IT news
  • Tech
  • World
  • Contact
No Result
View All Result
  • Home
  • About us
  • IT news
  • Tech
  • World
  • Contact
No Result
View All Result
No Result
View All Result
Home IT news

Two vulnerabilities in the operating systems

admin by admin
August 22, 2022
in IT news
0
Two vulnerabilities in the operating systems
0
SHARES
13
VIEWS
Share on FacebookShare on Twitter

Unusually shortly after an update of the operating systems last month, Apple is once again carrying out an iOS update. Californians have to close two critical security gaps that could be “actively exploited” by cyber attackers, the group said.

Most of the Group’s devices running the current versions of the operating systems are affected – iPhones and iPads with the iOS or iPadOS 15 software generation, as well as Macbooks and Apple computers with the macOS Monterey operating system. Users should install the latest versions iOS 15.6.1, iPadOS 15.6.1 and macOS Monterey 12.5.1 on their respective devices as soon as possible.

An “anonymous researcher” alerted the company to the gaps. The one vulnerability concerns the software “Webkit”, with which content is displayed in Apple’s own browser Safari. Unlike Apple computers, other browsers on iPhones and iPads also use the Webkit software, so mobile devices are even more at risk. The other vulnerability concerns the “kernel”, i.e. the program core of the operating systems.

Especially the duplication of vulnerabilities is an alarming sign for experts. This would allow attackers to “basically get full access to the device,” says Rachel Tobac, head of Socialproof Security, an IT security consultancy based in San Francisco.

Users who have not yet carried out the security update would only have to visit a certain website so that hackers could play malware on their device via the gap in Webkit. From there, the attacker would get to the core of the operating system via the second vulnerability and could access important data.

According to Apple, the following devices are affected:

  • iPhone from the model 6s (2015)

  • iPad from the 5th generation (2017)

  • iPad Mini from the 4th generation (2015)

  • iPad Air from the 2nd generation (2014)

  • iPad Pro (all models)

  • iPod Touch, 7th Generation (2019)

Previously, Apple’s software was considered safe from hacker attacks and computer viruses. In recent years, however, the group has had to repeatedly publish emergency updates to close security gaps that cyber attackers could have exploited.

Apple: The security vulnerabilities are piling up

The reason for this is Apple’s success. In the past, Californians mainly sold less networked iPods and niche computers for a smaller group of users. An attack was often not worthwhile for cybercriminals for mass reasons – an attack on Windows systems almost always seemed more worthwhile.

However, Apple is now a major player in the tablet market. In addition, the company sold 48 million smartphones in the second quarter of 2022, according to the IT consultancy Strategy Analytics, thus achieving a global market share of 16 percent. This makes Apple devices valuable targets for hackers.

However, Apple is also closing more gaps in its own systems because the tech group has offered a reward for experts who find vulnerabilities and report them to the group. As a result, users get more of the security risks. But the risk of unnoticed security vulnerabilities that hackers could exploit is decreasing.

Previous Post

Messari: Ethereum is not as decentralized as assumed

Next Post

Canada Severely Restricts Crypto Trading

admin

admin

Related Posts

ChatGPT gets paid version with subscription model
IT news

ChatGPT gets paid version with subscription model

February 2, 2023
When is the HOT SALE 2023 in Mexico?
IT news

When is the HOT SALE 2023 in Mexico?

January 31, 2023
Dedicated Servers
IT news

The advantages of dedicated servers: cost, performance, security

January 27, 2023
Different types of proxies and their benefits for online security
IT news

Different types of proxies and their benefits for online security

January 27, 2023
Image technology: DHL warns against fake SMS – you need to know that fake SMS with supposed address queries from DHL are circulating at the moment. Sometimes the messages seem very authentic. That’s what’s behind it. More…
IT news

Image technology: DHL warns against fake SMS – you need to know that fake SMS with supposed address queries from DHL are circulating at the moment. Sometimes the messages seem very authentic. That’s what’s behind it. More…

January 25, 2023
Next Post
Canada Severely Restricts Crypto Trading

Canada Severely Restricts Crypto Trading

Premium Content

Reactive Grip will be at the GDC with a new demo

Reactive Grip will be at the GDC with a new demo

July 10, 2022
Virtuix partners with HTC and prepares support for Arizona Sunshine

Virtuix partners with HTC and prepares support for Arizona Sunshine

April 5, 2022
Amazon are waiting for new record sales Day Prime this year

Amazon are waiting for new record sales Day Prime this year

October 5, 2020

Browse by Category

  • Games
  • IT news
  • Tech
  • World

VRB News is ready to cooperate with webmasters and content creators. Send an email to info@virtualrealitybrisbane.com

Categories

  • Games
  • IT news
  • Tech
  • World

Recent Posts

  • ChatGPT gets paid version with subscription model
  • When is the HOT SALE 2023 in Mexico?
  • The advantages of dedicated servers: cost, performance, security

© 2021 - The project has been developed ServReality

No Result
View All Result
  • Home
  • About us
  • IT news
  • Tech
  • World
  • Contact

© 2021 - The project has been developed ServReality

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?