Be careful with your password! Another surprising bug in iOS 8

Be careful with your password! Another surprising bug in iOS 8

As the use of mobile devices becomes more widespread, it is important for users to be aware of various methods that attempt to steal personal data or passwords.

According to security expert Jan Soucek, a new email-based bug has recently emerged. This bug attempts to steal users' passwords by popping up a login window similar to iCloud. Hackers send email messages to target users and load HTML content remotely. At the same time, a window similar to iCloud verification pops up. If the user enters the Apple ID and password, the account will be stolen and the information will be leaked.

Soucek said he discovered this bug in January and reported it to Apple, but Apple has not responded to this issue. So Soucek made his discovery public through the Internet and released a package called "Mail.app injection package" in the hope of attracting the attention of users and Apple.

Apple has not responded to this issue yet. Apple has just fixed the "death code" bug in iOS 8.4 Beta 4. Now a new bug has been exposed. I hope Apple can fix it as soon as possible.

As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity.

<<:  China Passenger Car Association: In April 2024, the national passenger car market retail volume reached 1.532 million vehicles, a year-on-year decrease of 5.7%

>>:  Zeekr Auto: In April 2024, the monthly sales of the new Zeekr 001 reached 11,729

Recommend

In-depth analysis from 0 to 1: What is KOL operation?

What I talk about most with friends recently is K...

How many airports are there in our country (updated in July 2020)?

New airports are built in my country every year, ...

Is Toutiao worth $10 billion?

There have been a lot of debates about Toutiao...

For the entire process of online event operation, just read this article!

Event operations play an important role in the op...

99% of products fail due to poor operation!

How to succeed in starting a business? I believe ...

How do visually impaired athletes shoot and ski?

Xinhua News Agency, Chongli, Hebei, March 7 (Repo...

Microsoft hints at further integration between Windows 11 and Android

In a new job listing, Microsoft has confirmed tha...

Analysis of the evolution of private domain traffic!

Public domain traffic and private domain traffic ...