New security vulnerabilities on iOS 12.1 allow access to contacts and phone calls
New iOS 12.1 update is released by Apple with many new features. However, only a few hours later, a Youtuber named Jose Rodrigue discovered a serious security error of this update, allowing to bypass the lock screen of all iPhones without needing a password, good face ID. fingerprints.
According to Jose Rodrigue, this vulnerability relates to the new Group Face Time feature Apple added in iOS 12.1 update. When the iPhone is in lock screen mode, Jose Rodrigue "takes advantage" of the virtual assistant Siri to make or receive calls. After that, the call is converted to Group Face Tim call, now you can access the menu on the bottom right and click the "Add Person" or "Add people" button to access the contacts and view the information. believe on iPhone.
However, Jose Rodrigue said it could temporarily prevent this vulnerability by accessing the iPhone Settings and turning off the option to order Siri on the lock screen.
This is not the first time, iOS 12 updates have a serious security error related to passing this lock screen. Previously, iOS 12.0.1 update also had errors that allowed it to bypass the lock screen and steal images stored in the device.
With previous updates of iOS 6.1, iOS 7 and iOS 8.1, there have been many similar errors.
See more:
- iPhone X, iPhone 8 may slow down after upgrading to iOS 12.1
- Three critical holes in Linksys routers, hackers can take advantage of hijacking
You should read it
- AMD patched a series of security holes in the graphics driver for Windows 10
- Detecting a series of vulnerabilities can help hackers disable metal detectors at airports
- Top 30 serious security holes are being exploited by hackers the most
- Take a look at the most significant threats from the security world in 2019
- Warning of dangerous vulnerabilities on WinRAR, users should uninstall or upgrade to a new version
- Millions of Android devices stick with security holes in firmware, hackers can exploit to lock users' machines
- Microsoft silently updated Windows 10 to patch 2 serious security holes
- Detecting security holes that cause a series of D-Link VPN routers to be remotely attacked
May be interested
- Facebook is silently stealing user contactsinformation given by symantec - the leading security company in the world - startled many people. recently, security firm symantec has announced that users of facebook applications on android phones are being stolen phone contacts without even knowing it.
- Block spam calls and messages on the web Information Security Departmentare you annoyed by spam calls and messages from sales, real estate or insurance companies? try blocking spam calls and messages as announced by the information security department, and we guarantee you will no longer be bothered!
- Find security holes on every site with Niktothere are several tools and applications to find security vulnerabilities in web pages, but one of the simplest tools is nikto. this article will show you how to use nikto to check security holes on every site!
- Top 5 most dangerous remote execution vulnerabilities in early 2020, some even automatically infect other computers without users knowing.in the cybersecurity world, remote execution vulnerabilities are the most dangerous type when hackers can attack victims without physical access to the user's computer.
- Sync iPhone contacts with Gmailsynchronizing your iphone contacts to gmail is a way that you can store your gmail phone number in case your iphone has a problem but you can keep all contacts on your device. please refer to our article below.
- How to make calls from Windows 10 using the Your Phone appmicrosoft's your phone is an application designed for windows 10 that allows you to view notifications, photos, and messages on your android phone using a desktop computer.
- 9 misconceptions about security and how to resolvealmost every recent study of security vulnerabilities has come to the same conclusion: people are more risky factors for a business than technology gaps.
- Security vulnerabilities - basic insightssoftware vulnerabilities can be interpreted as a malfunction or weakness in software or operating systems. with the development of new attack technologies, the severity of software vulnerabilities is growing exponentially.
- How to set the ringing mode when there is an emergency with Essential Callswith essential calls app you can fully receive call notifications from important phone numbers even when your phone is in silent mode. essential calls lite will help you create your own contacts and ring when those numbers call.
- How to delete phone contacts from Instagramthis is a pretty useful feature, but if you feel like you don't need it, follow these steps to remove your personal contacts from instagram.