Vulnerability for iPhone phones: Apple did not respond!

The Technical University of Darmstadt in Germany found a feature that runs malware when the iPhone is turned off!
 Vulnerability for iPhone phones: Apple did not respond!
READING NOW Vulnerability for iPhone phones: Apple did not respond!

The Technical University of Darmstadt in Germany, which found a security vulnerability for the iPhone, published an article on the subject. The university that conducted the research announced that it sent an email to Apple before publishing, but representatives did not respond on the subject. Let’s take a look at the details of the news together.

Malware works even when iPhone is turned off!

When technological devices are turned off, they do not actually turn off completely so that the settings such as the time and date remain up to date. Likewise, iPhone phones go into low power mode instead of completely shutting down due to the operation of the Find feature or other features.

Researchers have also published a paper revealing that malware still works even when the iPhone is turned off. The fact that the phone is not completely shut down due to some programs becomes open to abuse. “The current low-power mode implementation on iPhone phones attracts new threats,” the researchers wrote in the article. He also made a statement.

The researchers who published the article additionally explained:

“The design of low-power mode features appears to be mostly driven by functionality without considering threats outside of their intended applications. . The application in the firmware is not safe from manipulations.”

Apple, who did not respond to the researchers who prepared the article, has not yet made a statement on the subject. A security firm commented on the article:

“Hardware and software attacks like the ones described have proven practical in the real world environment. The topics covered in this article are therefore practical.

What do you readers think about this issue? Do you think the discussed malware for iPhone will pose a danger? You can express your thoughts in the Comments section.

Comments
Leave a Comment

Details
180 read
okunma30654
0 comments