iOS 9.3.5 Fixes Massive Security Flaw: What IT Needs To Know

...

Join us for this enlightening webinar where you'll get insight into what to consider when building

An active threat using critical iOS zero-day vulnerabilities, which were dubbed "Trident," could allow hackers to install spyware on iPhones. IT managers should ensure employee devices are updated as soon as possible.

Stop. Drop what you're doing and update your iPhone. A new security hole found by researchers is critically dangerous. The vulnerability could lead to remote code execution, allowing hackers to completely take over an iPhone remotely. Apple has already issued a patch via iOS 9.3.5 and recommends everyone update immediately.

IT managers need to get the word out to employees right away or even remotely push the update. Here's why.

Ahmed Mansoor, a United Arab Emirates-based human rights activist, recently received a suspicious text message. The message asked him to click on an embedded link. Rather than click, Mansoor smartly forwarded the message to security researchers at the University of Toronto.

Citizen Lab at the University of Toronto partnered with Lookout to explore what might have happened had Mansoor clicked the link. It's a good thing Mansoor listened to his gut. The researchers found that the link would have force-installed a program through three previously unknown vulnerabilities in iOS. The app could have then taken over the phone and allowed the attackers to do what they wished.

The spyware, called Pegasus, is the most advanced attack Citizen Lab says it has seen, "because it takes advantage of how integrated mobile devices are in our lives and the combination of features only available on mobile -- always connected (WiFi, 3G/4G), voice communications, camera, email, messaging, GPS, passwords, and contact lists," explained Citizen Lab in a blog post.

"It is modular to allow for customization and uses strong encryption to evade detection. Lookout's analysis determined that the malware exploits three zero-day vulnerabilities, [called] Trident, in Apple iOS."

[See Mobile Messaging Apps: 8 Tips for Keeping Your Workplace Secure.]

The researchers contacted Apple earlier this month and the company moved to plug the security holes very quickly.

iOS 9.3.5 covers an information leak at the kernel level, a kernel memory corruption that can lead to jailbreak, and a memory corruption in WebKit that leaves Safari open to attack. These would allow hackers to jailbreak an iPhone remotely and install surveillance software that could spy undetected.

Businesses, especially those that have mobile devices in the field, need to protect against this vulnerability as quickly as possible.

iOS 9.3.5 can be downloaded over the air directly from Apple.

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    6 Reasons Hackathons Are Good For IT

    And while lavish parties or paintball outings may suit some organizations, IT groups should give serious consideration to holding a hackathon.But more to the point, those in IT can help their organization do better through hackathons.
  • 5300c769af79e

    Split/Second (for PC)

    Still, if you're looking for a PC racing game that isn't aimed at the Top Gear crowd, Split/Second is a PC game you'll want in your Steam library.Compare Similar ProductsCompare Rocket League (for PC) %displayPrice% Ridge Racer Unbounded %displayPrice% Street Fighter V (for PC) %displayPrice% Metal Gear Solid V: Ground Zeroes (for PC) %displayPrice% D4: Dark Dreams Don't Die (for PC) %displayPrice% Adventures of Pip (for PC) %displayPrice% Experience the CarmageddonSplit/Second's main attraction is its multitiered PowerPlay system, which lets you take out opposing drivers who seek fame and fortune.
  • 5300c769af79e

    Samsung Galaxy Note 7 vs. S7 Edge: Is scribbling worth the extra scrilla?

    The new Galaxy Note 7 is a venerable powerhouse of a smartphone.The Galaxy Note 7, you might say, is the stylus-touting smartphone that dreams are made of.
  • 5300c769af79e

    Horizon Prioritizes Data And Patient Experience

    When adopting new technologies, "very rarely do we build everything ourselves," said Blackwell.For this project, Horizon employed a buy, build, and partner approach.