{"id":18247,"date":"2018-06-01T08:00:44","date_gmt":"2018-06-01T12:00:44","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=18247"},"modified":"2022-04-27T15:14:45","modified_gmt":"2022-04-27T19:14:45","slug":"ios-exploit-targets-your-iphone-and-ipad-devices","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/ios-exploit-targets-your-iphone-and-ipad-devices\/","title":{"rendered":"iOS Exploit Targets Your iPhone and iPad Devices"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">One of the benefits of purchasing an iOS device from Apple is the company\u2019s strict proprietary policies that help protect you against the possibilities of malware and other exploits. However, no device is truly safe. A new exploit has been discovered and is targeting your smartphone and the rich data it holds. Worst of all, the attack takes advantage of an iTunes feature, allowing a hacker to access the content you once believed was safe. If you own an iPhone or iPad, you\u2019re at risk, but here are a few preventative measures you can take to decrease the odds of an attack.<\/span><\/p>\n<p><b>How They Are Accessing Your Personal Data<br \/>\n<\/b><span style=\"font-weight: 400;\">Researchers discovered that the vulnerability takes advantage of an iTunes feature known as \u2018<\/span><a href=\"https:\/\/support.apple.com\/en-us\/HT203075\"><span style=\"font-weight: 400;\">iTunes Wi-Fi Sync<\/span><\/a><span style=\"font-weight: 400;\">.\u2019 Normally, this feature allows users to sync their photos, music, and other content wirelessly over a Wi-Fi network, without the need to plug into a Mac or PC. However, in this circumstance, hackers take advantage of the useful ability to access your device\u2019s personal data. Worst of all, you don\u2019t need to enable \u2018iTunes Wi-Fi Sync\u2019 because an attacker is able to perform the action themselves.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/android-vs-iphone-one-better-security\/\"><b>Android vs. iPhone: Which One Has Better Security?<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The exploit begins when the user of an iOS device, such as an iPhone or iPad, connects to an unidentified machine bobby trapped with the malware and <\/span><a href=\"https:\/\/support.apple.com\/en-us\/HT202778\"><span style=\"font-weight: 400;\">chooses to \u2018Trust\u2019 it<\/span><\/a><span style=\"font-weight: 400;\">. This action allows the machine to communicate with your device, as well as set up the remote access it needs to breach your security.<\/span><\/p>\n<p><b>Defending Yourself Against the Exploit<br \/>\n<\/b><span style=\"font-weight: 400;\">The solution may seem simple, like ensuring you don\u2019t plug your iPhone or iPad into any unfamiliar machines &#8211; and you definitely shouldn\u2019t choose the \u2018Trust\u2019 function. Luckily, it really is that simple! Certainly, don\u2019t plug devices into machines you\u2019re unfamiliar with, but there could be times when a familiar machine isn\u2019t readily available.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A common occurrence when you might plug your device to an unfamiliar machine is at a local pharmacy\u2019s photo department. Many pharmacies offer printing services directly from your smartphone. However, this service does require you to choose \u2018Trust\u2019. For an easy workaround, offload your photos to a flash drive, or utilize a third-party solution from the App Store to wirelessly transmit photos to your pharmacy\u2019s photo department.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Overall, the new exploit may be dangerous, but it\u2019s quite easy to avoid. As with many instances of cybersecurity, remaining cautious and using your best judgment is a strong defense against malicious attacks.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple devices have remained relatively safe over the years, but a new vulnerability is now aimed directly at spying on your personal data.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[259,218,545,223],"class_list":["post-18247","post","type-post","status-publish","format-standard","hentry","category-security","tag-hackers","tag-privacy","tag-safety","tag-tips"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=18247"}],"version-history":[{"count":3,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18247\/revisions"}],"predecessor-version":[{"id":18346,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18247\/revisions\/18346"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=18247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=18247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=18247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}