Security researchers discover Apple Bluetooth bug that can remotely wipe nearby iPhones/iPads

Security researchers discover Apple Bluetooth bug that can remotely wipe nearby iPhones/iPads

On October 14, as we all know, Apple's operation of deleting information on an iPhone, iPad or iPod touch and restoring the device to factory settings is called "erasing". In theory, it can only be performed after the person verifies the lock screen password or Apple ID password.

Now a security researcher has discovered a new vulnerability that can remotely erase other people's iPhones, such as using a drone to erase the iPhones of everyone in a city. Fortunately, this bug has been fixed in the latest iOS 15.1 beta, and the official version is expected to be released next week.

That said, other iOS devices running iOS 15.0.2 and earlier could still be vulnerable, but iOS 15.1 is currently only available to developers and public testers.

[[428804]]

Judging from the reply letter from Apple's security department to him, iOS 15.1 is expected to be launched to users next week, and Apple also requires that the details of the vulnerability exploited be kept confidential until the security patch is launched to all users. The hacker also said that a complete proof-of-concept demonstration will be released at that time.

This remote code could allegedly have other impacts beyond remotely wiping nearby devices, depending on how the attack vector in the iOS Bluetooth stack is used.

<<:  Why is it not recommended to turn off the lights at night to play with mobile phones? It would be great if you knew these hazards earlier

>>:  WeChat voice messages are automatically played in Moments! Netizens: Parading in the streets is a social death

Recommend

How to create a landing page with high conversion rate? Share 2 pictures!

Unlike traditional industries that can bring prod...

Are “fast-thinking” programmers better?

A few days ago, an article on Hacker News titled ...

New media operations: 3 writing strategies used by big Vs! Don't ignore it!

Since 2013, every year, people would ask, “What i...

What is the meaning of Wenchang Tower? What is the function of Wenchang Tower?

Wenchang Tower can promote academic success. Many...

How to analyze user activity data?

In this article, I will analyze user activity dat...

First full-brain map of insects completed

An international team led by Johns Hopkins Univer...

The Blazer is back! Chevrolet's new Blazer is launched

The Chevrolet Blazer was put into production in C...

Tips for building B2B user portraits!

Let me share an approach to B2B user profiling . ...

Hippocampus portrait intensive course 6 lessons portrait intensive course

Hippocampus Portrait Refining Course 6-hour Portr...