• Your IP: 44.200.136.171 (VA, United States)
  • Your ISP: Amazon.com
  • Your Status: Unprotected
  • Get Protected

August 23, 2022

Apple warns users of major security vulnerability

Posted by

Apple Inc. has warned users of a serious vulnerability in the security of iPhone, iPad, Mac, and select iPod devices.

On August 17, 2022, the company released two security reports detailing the vulnerabilities, which may allow attackers to seize complete control over affected devices. In the event of a breach, cybercriminals would have the ability to impersonate the owner of the device, downloading and running any software in their name, accessing their personal files and accounts, and more.

In addition to the possibility for criminals to gain “full admin access” to Apple devices, a second breach was discovered in browser engines used by Apple applications like Safari and Mail. This flaw would allow cybercriminals to download malware onto a user’s device.

Apple’s security reports revealed few further details, attributing the discovery of the vulnerabilities to an anonymous researcher.

The affected devices include:

  • the iPhone 6S and later models
  • the iPad fifth generation and later models
  • the iPad Air 2
  • all iPad Pro models
  • all Mac computers running MacOS Monterey

Security experts have recommended that anyone using these devices update them to the latest version, which includes a security patch for the vulnerabilities. 

Can you protect your devices?

In addition to updating affected devices, users can improve their device security by:

  • Using a secure VPN on unsecured networks. A common method for cybercriminals to access users’ devices is through unsecured wi-fi networks, like public wi-fi hotspots. Any data transferred via these networks may be visible to other users of the network. VPN software encrypts user data and traffic, ensuring others can’t access it.
  • Changing and strengthening account passwords, especially if you suspect a breach. Criminals can break through weak passwords using a technique called “stuffing.” With this technique, they test common password combinations with user emails. By using strong passwords, users can help prevent these attacks. 
  • Only download content from trusted sources. Trusted sources may include apps through the App and Android stores. They tend to employ more rigorous app testing and security protocols. Content downloaded from untrustworthy sources may conceal malware that could infect user devices.

This recent security vulnerability is not the only one Apple has encountered. In July 2021, the company released a similar report detailing a security flaw that was being “actively exploited.” Commercial spyware companies around the world, such as Israel’s NSO Group, have been found to discover and exploit such flaws, which can result in infection with malware, data theft, and user tracking.

Remaining vigilant and prompt when it comes to device updates, password security, and general digital safety hygiene is one of the best ways to stay safe when such breaches are discovered.

Posted by

More Blog Posts

Privacy Tip of the Week: Cover Your Webcam and Mic

September 16, 2022

Privacy Tip of the Week: Cover Your Cameras and Mics

Our homes are filled with cameras. They’re on our computers, phones, doorbells, TVs, refrigerators, and vacuum cleaners. Sure, it’s great to Zoom with your cool aunt who travels the world for a living. And who wouldn’t want to be able to peek into the fridge while grocery shopping because you aren’t sure how many eggs […] Read more
Teach Kids Privacy

September 9, 2022

Privacy Tip of the Week: Teach Kids About Online Privacy

Millions of people around the world have never experienced a time before the internet. They were born into the fastest moving technological era of all time, some seemingly with an iPhone in their hands. In many cases, the youngest of children can operate a computer better than most adults. The internet is hugely beneficial to […] Read more
Secure Messaging Header

August 15, 2022

What to Look For in Secure Message Apps

Two hundred years ago, we sent messages by written letter. Then we moved to the telegraph, followed soon after by the telephone. When we invented the internet, communication was revolutionized once more. We were able to send messages instantly around the world in the form of email, and texting came in short order. Now, the […] Read more

Grab the limited deal now!

Our best price ever! Get HotBot VPN for 66% off today. Our app can be used on up to 6 devices at a time, doesn't limit speeds, and increases security and freedom when using the internet.

{{ localCurrencyFn }}
1 Year Plan
{{ plans[1].currency }}

{{ trialPriceNumeric(1) }}

/mo

Save 66%

{{ plans[1].oldPrice }} {{ plans[1].formatPrice }}

Billed every year.

1 Month Plan
{{ plans[2].currency }}

{{ trialPriceNumeric(2) }}

/mo

{{ plans[2].monthPrice }}

Billed every month.

Get the HotBot VPN Mobile App.

Download our apps for iOS and Android