33 C
Qādiān
Monday, May 19, 2025

Reshaping Perspectives and Catalyzing Diplomatic Evolution

Your cherished photographs and moving images are at risk. Vulnerabilities have been exposed that enable cyber criminals to breach the “iPhone”. Here is how you can safeguard yourself.

Technology experts have identified two errors in the Apple operating system, less than 10 days after the technology giant revealed other errors that it suffers from. "iOS 16" According to a report by the Daily Mail.

The latest discovery allows cybercriminals to bypass security protections and run malicious code to access users’ photos and messages, as well as their address book and calendar.

There are several ways to protect your personal information from hackers lurking in the shadows, such as using only trusted apps in the App Store and not opening messages from unknown users.

Apple recently added new security vulnerabilities to its product security update page, urging users to download "iOS 16.3.1" to fix problems.

The privacy experts co "Vpn Overview" Information Security has information about two vulnerabilities (CVE-2023-23520) and (CVE-2023-23531) that allow attackers to bypass the cryptographic signature process and run malicious code outside the security sandbox.

said Christopher Bolfstein, of "Vpn Overview" in a statement "Apple has strict restrictions about what software can run on devices. And it is allowed "Android" By downloading third party apps, that is why we usually see more malware for Android "android".

According to Bolfstein, it includes part of the safety measures "All Apple-approved apps are signed with a developer certificate. These apps are also limited in the actions they can take" Such as knowing the geographical location or entering phone addresses.

These vulnerabilities allow cybercriminals to access calendars, addresses, photos, videos, and stored files.

It is possible for hackers to spy on users using their audio or video microphones.

And I participated "Vpn Overview" Tips on how to protect your personal information.

These tips include:

** Use trusted app only.

** Do not trust unknown devices when connecting a device "iPhone" your.

** When you connect your smartphone to a computer to charge it, a notification appears on the screen asking if the device should be trusted, select Always "Disallow".

** urges "Vpn Overview" Users not to click likes or open messages from unknown senders and to keep their devices updated with the latest operating system.

Apple has added the previous vulnerabilities – identified earlier this month – to its Homeland Security Warning List.

The company says it does not disclose, discuss or confirm security issues "Until an investigation is made and patches or versions are available". According to Al Jazeera Net.

More

Cobalt is the new oil and Congo is the new war zone

The Democratic Republic of Congo sits atop a $24...

Zoom faces heavy fine in Russia for violating data laws amid western defiance

A Moscow court has ruled against Zoom Video Communications,...
Show your support if you like our work.

Author

Arab Desk
Arab Desk
The Eastern Herald’s Arab Desk validates the stories published under this byline. That includes editorials, news stories, letters to the editor, and multimedia features on easternherald.com.

Editor's Picks

Trending Stories

Laurita Fernandez poses totally nude on her back in her Instagram

Laurita Fernandez is one of the most talented dancers...

Prostitution in Dubai: Understanding the Dark Side of the City

Dubai, a city celebrated for its lavish shopping experiences,...

Jordan Tunnel Accident: Tragic Transformation from Wedding to Funeral

A devastating Jordan tunnel accident has turned a celebratory...