Story image

iOS gets another round of critical security updates to block major security holes

27 Jul 2017

Apple’s iOS 10.3.3 has undergone an urgent update after massive security holes were discovered in many of the system’s functions.

The security updates affect iPhone 5 and later, iPad 4th generation and later, as well as the iPod Touch 6th generation.

The flaws can allow remote attackers to run arbitrary code or terminate apps through a number of iOS systems, including its contacts, messages, notifications, Safari, telephony, wifi and other system functions including kernels, libxpc, EventKitUI and CoreAudio.

Attackers could also potentially execute code by taking advantage of a device’s wifi chip, while users who stumbled upon malicious web content could find that their browser was frozen due to an infinite number of print dialogues.

In total, there are 24 areas and 47 CVE updates listed for iOS 10.3.3, most of which were discovered by Google’s Project Zero, Baidu Security Lab, university professors and security researchers.

Apple says that it doesn’t discuss or confirm security issues until it has investigated and made relevant patches and updates available.

While some iOS users still believe that devices are still relatively immune from hacking, proof from security organisations shows otherwise.

Earlier this year ESET’s Graham Clueley said in a blog that updates such as these are not about pointing out every single flaw in the system – it’s more of an encouragement for people to update systems at the earliest opportunity.

“Apple products may find themselves in the firing line of attacks less often than their Windows and Android cousins, but that doesn’t mean they’re immune. If can learn anything from the events of the last few days it is surely the need to keep systems up-to-date and make regular backups of your data,” he says.

iOS and other Apple devices have also been targeted by spyware such as Pegasus and XAgent and AceDeceiver – a malware that targeted Apple’s DRM flaws.

Other cases this year included OSX/Dok, which popped up in April 2017. Check Point researchers discovered the Trojan, which was able to get around Apple’s security features and hijack all traffic on a Mac.

A ransomware variant called KeRanger was also able to encrypt Apple devices in March 2016. The ransomware was introduced via an update of Transmission torrent client 2.9.0. It was then able to run alongside the software and secretly encrypt files.

Palo Alto Network's Claud Xiao and Jin Chen explain how KeRanger works:

"The KeRanger application was signed with a valid Mac app development certificate; therefore, it was able to bypass Apple's Gatekeeper protection,” said Palo Alto Networks researchers Claud Xiao and Jin Chen at the time.

Apple quickly revoked the certificate to stop further ransomware attacks.

Huawei talks P Series history - and drops hints on the P30
Next week will see the covers come off the new Huawei P30 Series at a special launch event held at the Paris Convention Center.
Hands-on review: Xiaomi’s Mi Mix 3 and the Amazfit Bip
You’ll probably be sad to see another device say ‘farewell’ to the 3.5mm headphone jack. Fortunately though, as mentioned, Xiaomi were kind enough to include an adapter in the box.
How Cognata and NVIDIA enable autonomous vehicle simulation
“Cognata and NVIDIA are creating a robust solution that will efficiently and safely accelerate autonomous vehicles’ market entry."
Kiwis know security is important, but they're not doing much about it
Only 49% of respondents use antivirus software and even fewer – just 19% -  change their passwords regularly.
Instagram: The next big thing in online shopping?
This week Instagram announced a new feature called checkout, which allows users to buy products they find on Instagram.
Google's Stadia: The new game streaming platform intertwined with YouTube
Move over Steam, Uplay, Origin and all the other popular gaming platforms – Google has thrown its hat in the ring and entered the game streaming market.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
How AI can transform doodles into photorealistic landscapes
The tool leverages generative adversarial networks, or GANs, to convert segmentation maps into lifelike images.