Apple Mobile Devices Vulnerable to HackAdded: Wednesday, March 5th, 2014
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
The developers claimed that a major vulnerability in Apple software for mobile devices can enable hackers to intercept email and other communications that are supposed to be encrypted. In addition, the experts said that Mac computers are even more exposed than mobile devices.
In case hackers obtain access to a mobile user’s network, for example by sharing the same unsecured Wi-Fi service offered by a public place, they could see or alter exchanges between the user and protected websites like Gmail and Facebook. In the meantime, governments having access to telecom carrier information could do the same thing.
The tech giant didn’t reveal when or how it learned of the vulnerability in the way its operating system handles sessions in secure sockets layer or transport layer security. Apple also didn’t provide information on whether the flaw was exploited and by whom.
However, a statement on Apple support website was blunt, saying that the software “failed to validate the authenticity of the connection”. The company developers released software patches and updated the current version of iOS for iPhone 4 and later, 5th-generation iPod touches, and iPad 2 and later.
The security experts explain that without that fix, an intruder could impersonate a protected website and sit in the middle as email or financial information was going between the user and the real website. After analyzing the Apple fix, some security experts claimed that the same flaw also existed in current versions of Mac OSX, running Apple laptop and desktop PCs. The problem is that no patch is available yet for that OS, though it is expected in the nearest future.
Since spies and hackers can also study the issued patch, they could in response develop programs to take advantage of the vulnerability within days or even hours. Industry observers say that the issue was a fundamental bug in SSL implementation, and OS X was at risk.
The tech giant didn’t provide any comments on the issue. The bug was in how well-understood protocols were implemented, representing an embarrassing lapse for Apple, which was recently stung by leaked intelligence papers claiming that authorities could successfully break into any iPhone.
Posted by: Date:
Wednesday, March 5th, 2014
|posted by (2014-03-05 14:04:46)|
|Windows and Android getting owned by the million so why is a "potential" hack for Apple news? I have always been curious about that...This is not the Information Age it is the Disinformation Age.|
|posted by (2014-03-06 03:58:56)|
|This is nearly 2 week old news.|
SirSeedsAlot: This is a big deal because its such an epic fail. This is a man-in-the-middle attack that hackers do not even need to take control over your phone. The phone is sufficiently flawed. Apple may claim this was accidental, but its pretty hard to believe due to the error. Read up on it more, then you'll understand why it's so bad. If this bug happened to Microsoft or Google, it would be a completely different story. Just Apple gets away with some inexcusable security practice, for the umpteenth time. Go to gotofail[dot]com for more info and see if you're affected.
Bottom line, Apple cares so much about your privacy and security, that they either made it possible for NSA to eavesdrop on iOS communications (co-operated), or they are so inept that they introduced such a careless bug into a significantly important piece of code.
It really, really, is an epic fail. No pun intended.
|Hi Timbo, no argument with the spies at our doorstep. That makes Apple just like all the other major players out there. Taking millions of dollars from the Feds in exchange for breaching our privacy.|
4th Amendment in USA: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
|posted by (2014-03-09 11:26:20)|
|its a really big deal !!|
|I might actually find it charming if the hackers were interested in my emails, because I'm certainly not. The emails I send and receive are usually so boring I would probably be happy enough to upload them all to the internet for everyone to read - no need for hackers. None of them ever contain any vital, valuable or interesting information. If I get hacked, so what||
Most Popular Stories