Apple confirms the existence of a series of serious vulnerabilities that can cause iPhones to be hacked
On its support page, Apple has listed the fixed security vulnerabilities including three in the Kernel kernel that could allow an application to grant itself privileges to execute arbitrary code; four vulnerabilities in Safari's Webkit and vulnerabilities in Siri and iCloud voice assistants.
Apple added that hackers have not been able to exploit any of the above security holes to attack users.
Patches for these 22 security holes have been released by Apple in the recent iOS 15.1 and iOS 14.8.1 updates. When releasing these updates, Apple also informs users that these security patches are important and recommended for all users.
Therefore, if your iPhone is using iOS 15, update to iOS 15.1 version, and for those who are using iOS 14, quickly update iOS 14.8.1 now to patch security vulnerabilities. , helping to avoid the risk of being attacked by hackers.
Apple's continuous release of security updates for iPhone users makes many people wonder: Is the iPhone less secure than before?
In fact, the fact that security researchers are trying to find security holes in Apple devices will make the company more careful in protecting users. And the fact that the company rolls out security patches that are deployed quickly to users proves it.
You should read it
- High security but iPhone can still be hacked when accessing malicious websites
- This is the first person in the world to hack iPhone and then he was only 17 years old
- The iPhone can be hacked with just one message without requiring user interaction
- The Mail app on iOS has serious vulnerabilities
- iCloud has been hacked, Apple chooses ... silent
- Only charging the battery through a computer, your iPhone may also be hacked
- Signs that your iPhone has been compromised by a hacker
- Protect iPhone, iPad before iCloud security hole
- Internet Explorer has vulnerabilities, unused users are still hacked
- Older iPhone users should update to iOS 16.7.6 immediately
- Hackers track iPhone prototypes to exploit vulnerabilities
- How iPhone vulnerabilities allow websites to hack iOS devices
Maybe you are interested
Should I buy a USB, Bluetooth or NFC security key?
4 Security Steps to Follow When Using Remote Access Applications
Series of DrayTek router models have security holes
If you have an AMD CPU, install this important security update!
Roundup of new Chrome features and security updates
Google releases emergency security patch, fixes 4 security flaws on Chrome