

Apple users will need to update their devices as soon as possible after cybercriminals discovered a major flaw that could allow hackers to access their devices.
The vulnerability known as “AirBorne” allows hackers to install malware, spy on your private data or even listen to your conversations when they are connected to the same Wi-Fi network as your devices, including public places such as airports, cafes or even the office, The Post reported.
Dramatic Video: Florida officers catch runaway boat with no driver
To avoid the attack, users are advised to update all devices to the latest version of the software, especially those with AirPlay connection.
It is also recommended to disable the AirPlay feature altogether if it is not in use, as it serves as an access point for hackers to take control of your devices.
Devices that are not in active use, such as a Bluetooth speaker that is gathering dust, could be another entry point for hackers.
“Because AirPlay is supported by such a wide variety of devices, many will take years to be patched, or never will be,” said Gal Elbaz, chief technology officer and co-founder of Tel Aviv-based cybersecurity firm Oligo, in a statement to Wired. “And it’s all because of vulnerabilities in a single software that affect everything.”
Flaws found in the AirPlay protocol
The flaws, 23 to be exact, were found in Apple’s AirPlay protocol and software development kit (SDK), which allows users to transfer photos, music and videos between devices.
While Apple has released security updates to fix the flaw in its devices, millions of third-party devices, from smart TVs to set-top boxes and in-car systems, could remain easy targets if their manufacturers have not patched them.
This means that even if your iPhone is fully up to date, a connected speaker or TV could act as a backdoor, and hackers love backdoors.
“If a hacker manages to access the same network as one of these devices, they can take control and use it as a springboard to access everything else,” Elbaz warned.
Cybersecurity expert Patrick Wardle, CEO of Apple-focused security firm DoubleYou, also noted that users and the companies that created them often neglect these third-party time bombs.
“When third-party manufacturers integrate Apple technologies such as AirPlay via an SDK, Apple no longer has direct control over the hardware or patching process,” Wardle said.
As a result, if third-party vendors delay the process or skip updates altogether, users could be exposed and undermine consumer trust in the entire Apple ecosystem.
This news was originally published on this post .
Be the first to leave a comment