Sunday, August 9, 23:14
Home security IOS devices can be hacked just by sending emails

IOS devices can be hacked just by sending emails


Although the Apple is one of the companies that always emphasizes the importance it gives to the security of users, two new vulnerabilities zero-day discovered in the embedded e-mail application compromises more than 2 billion devices iPhone and iPad.

The vulnerabilities discovered by security researchers at ZecOps, exploited by hacker for the last two years at least, to spy on high-end user devices.

The first is an out-of-bounds write bug, while the second defect is a heap overflow issue according to report of researchers.

In order to take advantage of vulnerabilities, intruders must send a specially designed e-mail, which consumes a certain amount of memory, forcing the application to stop working. This way the intruders can then hack the devices iOS and take control remotely.

The second vulnerability is even zero-click, which means that the user does not need to do anything in order for the attacker to be able to take advantage of it. Another worrying point is that users have no indication that their devices have been attacked.

According to the researchers, the two vulnerabilities they discovered have been detected on various Apple devices in the last 8 years and seem to affect the latest version of iOS 13.4.1. The defects have been largely exploited by malicious agents targeting VIP users such as:

  • Employees of Fortune 500 companies in North America
  • A journalist in Europe
  • A VIP from Germany
  • MSSP from Saudi Arabia and Israel
  • An executive working for a Japanese transport company
  • An executive working for a Swiss company

The company has been notified of vulnerabilities and is already preparing a beta version that contains a fix for affected devices, which it is expected to present to users of the stable version in the next iOS 13.4.5 update.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


How to type in multiple languages ​​simultaneously on Android

People in today's world are very much addicted to smartphones. They provide access to many applications that can be used mainly ...

LucidPix: Make your photos 3D with this app!

Give a 3D format to your photos, with the LucidPix application, which is available in various versions for both Android and iPhone ...

Private or anonymous browsing: Does it guarantee your privacy on the Internet?

The term "private" is relevant, especially when it comes to private or anonymous browsing on the Internet, a setting in your web browser ...

Businesses: 8 types of cyber attacks to watch out for

Nowadays, all businesses, small and large must be on alert, as they can ...

How to reverse image search via Google?

The term "image search" is familiar to those who use search engines. It means that you are looking for an image related to a text that ...

Email tracking: How to be invisible in Gmail

Most people do not know what "email tracking" is, and they often fall victim to hacking and data interception when they open ...

Free services to check the validity of your passwords

Two-factor authentication, one-on-one connectivity and other tools have made it easier than ever to improve your internet security, ...

How can you back up your Gmail?

Many users may change jobs, decide to stop using a particular email account or just want a copy ...

Amazon Prime Video: How to create a new user profile?

Amazon Prime Video has added a new handy feature: the ability to create separate profiles with individual parental controls. See how you can ...

Hacker leaked online 20 GB of Intel internal documents!

Intel is investigating reports that a hacker has leaked online 20 GB of data coming from the giant of ...