iOS 9.3.5 Fixes Massive Security Flaw: What IT Needs To Know

...

Join us for this enlightening webinar where you'll get insight into what to consider when building

An active threat using critical iOS zero-day vulnerabilities, which were dubbed "Trident," could allow hackers to install spyware on iPhones. IT managers should ensure employee devices are updated as soon as possible.

Stop. Drop what you're doing and update your iPhone. A new security hole found by researchers is critically dangerous. The vulnerability could lead to remote code execution, allowing hackers to completely take over an iPhone remotely. Apple has already issued a patch via iOS 9.3.5 and recommends everyone update immediately.

IT managers need to get the word out to employees right away or even remotely push the update. Here's why.

Ahmed Mansoor, a United Arab Emirates-based human rights activist, recently received a suspicious text message. The message asked him to click on an embedded link. Rather than click, Mansoor smartly forwarded the message to security researchers at the University of Toronto.

Citizen Lab at the University of Toronto partnered with Lookout to explore what might have happened had Mansoor clicked the link. It's a good thing Mansoor listened to his gut. The researchers found that the link would have force-installed a program through three previously unknown vulnerabilities in iOS. The app could have then taken over the phone and allowed the attackers to do what they wished.

The spyware, called Pegasus, is the most advanced attack Citizen Lab says it has seen, "because it takes advantage of how integrated mobile devices are in our lives and the combination of features only available on mobile -- always connected (WiFi, 3G/4G), voice communications, camera, email, messaging, GPS, passwords, and contact lists," explained Citizen Lab in a blog post.

"It is modular to allow for customization and uses strong encryption to evade detection. Lookout's analysis determined that the malware exploits three zero-day vulnerabilities, [called] Trident, in Apple iOS."

[See Mobile Messaging Apps: 8 Tips for Keeping Your Workplace Secure.]

The researchers contacted Apple earlier this month and the company moved to plug the security holes very quickly.

iOS 9.3.5 covers an information leak at the kernel level, a kernel memory corruption that can lead to jailbreak, and a memory corruption in WebKit that leaves Safari open to attack. These would allow hackers to jailbreak an iPhone remotely and install surveillance software that could spy undetected.

Businesses, especially those that have mobile devices in the field, need to protect against this vulnerability as quickly as possible.

iOS 9.3.5 can be downloaded over the air directly from Apple.

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    Leveraging open source pcap software for robust, cost-effective security solutions

    Download One crucial element in any security solution is the ability to capture and monitor traffic in real time to provide visibility and insight into attempts to breach networked systems.Napatech provides the ideal support for this capability with its Network Acceleration Card (NAC).
  • 5300c769af79e

    IT Strategy News, Analysis, & Advice

    Jessica DavisBy Senior Editor, Enterprise Apps, 4/19/2016ReadPost a Comment IBM is not a startup, and venture capital is still borrowed money., offers real-world advice on how IT leaders can cultivate the talent needed to run these crucial systems.
  • 5300c769af79e

    AWS IoT Button Lets Devs Customize In The Cloud

    A physical expression of the patented "1-Click" online buying button that helped Amazon become successful, the Dash Button also looks like it will become financially meaningful to the company.On May 12, the company released the Amazon IoT Button, a programmable version of the Dash Button, to complement its AWS IoT service.
  • 5300c769af79e

    Sony plans to launch more than 5 mobile games by 2018

    With the PlayStation Vita not exactly turning into the runaway success Sony had hoped for, the company is looking to other devices to put its games into players’ pockets.The company began this practice back in March following a restructuring that turned Sony Computer Entertainment into Sony Interactive Entertainment.