On October 14, as we all know, Apple's operation of deleting information on an iPhone, iPad or iPod touch and restoring the device to factory settings is called "erasing". In theory, it can only be performed after the person verifies the lock screen password or Apple ID password. Now a security researcher has discovered a new vulnerability that can remotely erase other people's iPhones, such as using a drone to erase the iPhones of everyone in a city. Fortunately, this bug has been fixed in the latest iOS 15.1 beta, and the official version is expected to be released next week. That said, other iOS devices running iOS 15.0.2 and earlier could still be vulnerable, but iOS 15.1 is currently only available to developers and public testers.
Judging from the reply letter from Apple's security department to him, iOS 15.1 is expected to be launched to users next week, and Apple also requires that the details of the vulnerability exploited be kept confidential until the security patch is launched to all users. The hacker also said that a complete proof-of-concept demonstration will be released at that time. This remote code could allegedly have other impacts beyond remotely wiping nearby devices, depending on how the attack vector in the iOS Bluetooth stack is used. |
User motivation and resistance analysis When user...
The company's employer management is to make ...
Every time I see someone's peach buttocks, I ...
The concept of community operation is very popula...
In the primary school Chinese textbook, there is ...
Since I started my business and entered the field...
Produced by: Science Popularization China Author:...
"Am I the only one who is concerned about th...
Tesla CEO Elon Musk has previously stated that th...
/* Live to change the world Here, every work may ...
40 100-yuan bills were put into a money counting ...
Microsoft's dual-screen device, code-named &q...
In Android 10 and earlier versions, apps can get ...
April 25, 2023 is the 37th "National Childre...
NVIDIA released the Tegra X1 processor at noon to...