Apple: Security Bugs From The Vault 7 Leak Are Fixed
Worried how the recent trove of secret CIA documents affects you and the phone you’re currently using?
With regards to that particular set of bugs, (which describe numerous vulnerabilities in both Google’s Android and Apple’s iOS), iPhone owners are mostly in the clear, but not completely.
According to Apple, “many” of these vulnerabilities have already been patched in the latest version of iOS, and the company is working to “rapidly address” the remaining bugs.
“Apple is deeply committed to safeguarding our customers’ privacy and security. The technology built into today’s iPhone represents the best data security available to consumers, and we’re constantly working to keep it that way. Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80 percent of users running the latest version of our operating system,” an Apple spokesperson told Mashable in a statement. “While our initial analysis indicates that many of the issues leaked were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities. We always urge customers to download the latest iOS to make sure they have the most recent security updates.”
The leak — published by WikiLeaks on Tuesday and dubbed “Vault 7” — contains numerous references to security flaws in all major operating systems, including iOS.
The document is chilling, as it lists dozens of exploits that could enable the CIA — but also any malicious hacker with knowledge of these exploits — to snoop on your phone, read your text, eavesdrop your conversations and more.
Most of the exploits mentioned are a few years old, and the latest version of Apple’s mobile operating system, iOS 10, isn’t mentioned anywhere. However, one has to wonder whether a newer version of this document exists somewhere — one that contains exploits for the latest version of iOS.
WikiLeaks said the currently available trove of 8,761 documents is just the first part (dubbed “Year Zero”) of a series of leaks; the rest will be released sometime in the future.
The list of Android exploits is equally worrisome, listing numerous security flaws as well as programs and techniques that can be used to breach the security of various Android devices.
We’ve contacted Google for a comment on these, but haven’t yet heard from them.
Content Source: Mashable
Image Source: MacRumours, Tech News Today