The vulnerability in the iPhone that makes thieves happy

Apple products, with their high sale and resale values, have always been ideal targets for thieves, and even more so for the iPhone, their favorite candy.

That said, an American media reveals that he is a basic iPhone functionality that helps criminals steal your entire digital life. The passcode that unlocks your phone can give thieves access to your money and data; “it’s like a treasure chest”. iPhone thieves lock people out of their Apple accounts and empty their bank accounts, sometimes before the victims even know what happened.

In a few minutes, we were no longer able to access our Apple account and everything related to it, including photos, contacts and notes, not to mention that we are relieved of a few bills from our bank account. when it’s not, it’s just emptied. Stories like this are piling up in police stations on a daily basis, particularly in the United States.

To achieve their ends, the thieves use a remarkably low-tech trick, the thieves simply look at the owners ofiPhone type in their access codes, then they steal their targets’ phones and therefore their digital lives. They then exploit a simple vulnerability in the software design of all iPhones in the world, especially those of new generations. It is centered on the password “coded”the short string of numbers that authorizes access to a device, and passwords that serve as credentials for different accounts usually longer alphanumeric combinations.

With therefore theStolen iPhone and its password, an intruder can in a few seconds change the password associated with the Apple ID du owner, thus preventing the victim from accessing their account, which includes everything stored in the iCloud. The thief can also often loot the phone’s financial apps since the password can unlock access to all of the device’s stored passwords. What worries to the highest degree the digital authorities who see their notion of authority in front of this new mode of concealment, feeling a complexity that they did not need.

Morality to protect yourself against thieves, you have to remember that digital identity is now an integral part of our identity. Emails, conversations on social media, both private and public, photos shared, videos viewed, applications downloaded, websites visited…, all contribute to forging a digital personality and therefore a potential victim not only of data theft, but also of spyware on iphone. Caution and vigilance must therefore be exercised when handling them.

The spyware installs on your device and stealthily monitors your activity, relaying your data to other parties without your consent. It monitors your phone’s private data including your location, videos, photos, text messages and call history. It can even activate your microphone or camera and take screenshots, intercept calls, and monitor what you’re doing on apps like WhatsApp or Snapchat. One of the most famous such apps is called mSpy.

Apple will therefore have to resolve this “zero-day” vulnerability not yet known to developers which, on a severity scale of 0 to 100, is set at three-quarters. In other words and not to say it in computer language, it is as if we did not know that a secondary entrance existed at home without our knowledge, at the risk of thieves entering it without anyone noticing. perceive.

Previous Post Next Post