Categories: Security

iOS Exploit Targets Your iPhone and iPad Devices

One of the benefits of purchasing an iOS device from Apple is the company’s strict proprietary policies that help protect you against the possibilities of malware and other exploits. However, no device is truly safe. A new exploit has been discovered and is targeting your smartphone and the rich data it holds. Worst of all, the attack takes advantage of an iTunes feature, allowing a hacker to access the content you once believed was safe. If you own an iPhone or iPad, you’re at risk, but here are a few preventative measures you can take to decrease the odds of an attack.

How They Are Accessing Your Personal Data
Researchers discovered that the vulnerability takes advantage of an iTunes feature known as ‘iTunes Wi-Fi Sync.’ Normally, this feature allows users to sync their photos, music, and other content wirelessly over a Wi-Fi network, without the need to plug into a Mac or PC. However, in this circumstance, hackers take advantage of the useful ability to access your device’s personal data. Worst of all, you don’t need to enable ‘iTunes Wi-Fi Sync’ because an attacker is able to perform the action themselves.

Read More: Android vs. iPhone: Which One Has Better Security?

The exploit begins when the user of an iOS device, such as an iPhone or iPad, connects to an unidentified machine bobby trapped with the malware and chooses to ‘Trust’ it. This action allows the machine to communicate with your device, as well as set up the remote access it needs to breach your security.

Defending Yourself Against the Exploit
The solution may seem simple, like ensuring you don’t plug your iPhone or iPad into any unfamiliar machines – and you definitely shouldn’t choose the ‘Trust’ function. Luckily, it really is that simple! Certainly, don’t plug devices into machines you’re unfamiliar with, but there could be times when a familiar machine isn’t readily available.

A common occurrence when you might plug your device to an unfamiliar machine is at a local pharmacy’s photo department. Many pharmacies offer printing services directly from your smartphone. However, this service does require you to choose ‘Trust’. For an easy workaround, offload your photos to a flash drive, or utilize a third-party solution from the App Store to wirelessly transmit photos to your pharmacy’s photo department.

Overall, the new exploit may be dangerous, but it’s quite easy to avoid. As with many instances of cybersecurity, remaining cautious and using your best judgment is a strong defense against malicious attacks.

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

How to identify a spy app on your smartphone

In the United States, the use of spyware apps is a growing concern, affecting mobile…

56 years ago

5 trending digital scams: how AI is making fraud more dangerous

Every day, millions of mobile phone users receive malicious links through SMS, email, or social…

56 years ago

Pix Gains Momentum Abroad: Convenience and Security for Brazilian Travelers

Travel is about new experiences — and making payments without hassle is a crucial part…

56 years ago

Malicious links: what they are and how to protect yourself

Every day, millions of  cell phone users receive malicious links via SMS, email, or social…

56 years ago

Zero Trust: what it is, why it matters, and how dfndr security protects your phone with this concept

Have you heard of Zero Trust? The term is one of the most  important trends…

56 years ago

5 Reasons to Use Biometrics to Secure Mobile Devices

Mobile devices have become essential tools in both our personal and professional lives, but they…

56 years ago