Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

Apple’s Vulnerability exposes iPhones to attacks by stealthy computer pirates


Generally, The iPhones are considered safer than the Android devices.

Apple’s closed ecosystem and strict App Store policies limit the risk of malware, and its centralized software updates ensure better security. In contrast, the opening of Android allows users to install applications from various sources, and updates are often implemented at different times, which makes it more vulnerable to attacks.

However, iPhones are not immune to security defects. Computer pirates occasionally find forms Exploit them, as seen in Apple’s last warning. The company recently discovered that a vulnerability in iOS had been exploited for more than a year. While now a solution has been launched, reports suggest that computer pirates may have already been attacked to high value.

Get security alerts, expert advice: register in the Kurt Bulletin, Cyberguy’s report here

Woman with phone

A woman on her iPhone. (Kurt “Cyberguy” Knutsson)

What you need to know

Apple has uncovered Computer pirates that exploit a vulnerability in iOS that seem to have been persisting for more than a year. Vulnerability is a “zero day” defect, which means that criminals have already exploited it, according to the company’s latest security notice. Zero day defects such as this are especially dangerous because they are exploited before developers can emit solutions. Apple confirmed that this marks its first zero -day patch of 2025. Vulnerability affects iPhones that date back to the 2018 XS model, as well as newer iPads, Macs and even vision pro headphones.

Vulnerability, tracked as CVE-2025-24085, resides within the framework of Apple central media, a Software layer responsible for processing multimedia files. An error of memory corruption “for use later” allowed computer pirates to manipulate the system to execute unstable code, giving them high privileges to avoid security protocols. Apple’s notice suggests that computer pirates put together the defect through malicious applications disguised as legitimate media players. These applications are likely to abuse the basic media framework activating corrupt files, allowing attackers to infiltrate devices.

According to the reports, the attacks went to the versions of iOS prior to 17.2, launched in December 2023, which means that vulnerability may have been active since the late 2022. Security experts speculate that computer pirates focused on Individuals of high value, such as activists, executives or journalists, to avoid detection. The prolonged stealth of the campaign underlines the challenges of identifying sophisticated exploits already measured.

This underlines the critical need to update its devices to iOS 17.2 or posterior, since these versions include essential corrections to safeguard against this actively exploited vulnerability.

Vulnerability of iOS 2

Apple iOS 17.2 update included patches for various vulnerabilities. (Kurt “Cyberguy” Knutsson)

How to protect your iPhone and IPAD from malware

Apple’s response to vulnerability

In response, Apple has launched corrections throughout its ecosystem, including iOS 18.3, Sequoia macOS, watchos, tvos and visions. You must update your devices as soon as possible to stay protected. To install the update on your iPhone or iPad:

  • Gonna Settings
  • Tap General.
  • Click Software update.
  • Click Update now either Update tonight.

For the Council: I recommend you click Update now and also light Automatic updates remain covered in the future.

What is artificial intelligence (AI)?

Vulnerability of iOS 3

Steps to update the software on an iPhone. (Kurt “Cyberguy” Knutsson)

While Apple has repaired this problem, it is a reminder that staying update is key. Computer pirates always look for security gaps, so maintaining their updated software is one of the best ways to stay safe.

The scammers found a cunning way to avoid the security characteristics of their iPhone

7 ways to keep your insurance iPhone

Protecting your iPhone requires proactive security measures. Following these seven essential steps, you can significantly reduce the risk of cyber threats and maintain your personal information safe.

1. Keep your updated iPhone: I can’t say this enough. Your iPhone update It is regularly one of the most effective ways to protect it from security threats. Apple frequently releases updates that set vulnerabilities, including critical failures of zero day.

2. Download applications only from the app store: To minimize the risk of installing malware, just download applications from the Official App Store. Apple’s strict application review process helps to avoid malicious applications, but some threats can still happen. Always verify the details of the application, verify the reviews and be careful with the application permits before the installation.

3. Enable the lock mode for additional protection: For those of you who may have a higher risk, such as journalists or executives, Locking mode It provides an additional security layer. This feature limits certain device functionalities to avoid sophisticated cyber attacks. It can be turned on through Settings > Privacy and safety > Locking mode and is especially useful for those concerned with specific threats.

4. Enable messages: Use the built -in filtering options of your device to classify messages from unknown senders. This feature allows you to automatically order the messages of the unknown senders, easily filter the unreasonable messages and administer your messages of messages more efficiently. There are steps here:

  • Open Settings
  • Move down and click Applications
  • Tap Messages.
  • Light Filter unknown senders

Get the Fox business on the fly by clicking here

5. Stay cautiously with phishing attacks and install strong antivirus software: Phishing It is still one of the most common tactics used by computer pirates. Be careful when receiving messages or emails not requested on your iPhone, especially those with suspicious attachments or files. Always check the sender before opening anything. The best way to safeguard the malicious links that install malware, which potentially access their private information, is to have an antivirus software installed on all its devices. This protection can also alert it to the PHISHING Electronic Correos and Ransomware scams, maintaining their personal information and their safe digital assets. Get my elections for the best antivirus protection winners 2025 for your Windows, Mac, Android and iOS devices.

6. Check your security and privacy settings: Reviewing your iPhone safety configuration can help you maintain strong protection. You must also review application permissions in Configuration> Privacy and Safety To restrict access to confidential data, such as location or contacts. Allow Face or tact Id ID For safe access and activate two factors authentication (2fa) For Apple ID and other accounts. 2fa Add an additional security layer to your accounts by requiring a second form of verification, such as a text message or an authentication application, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

7. Invest on personal data elimination services: By reducing their online footprint, it makes it difficult for cybercriminals to obtain their contact information, preventing them from sending deceptive texts and emails first. While no service promises to eliminate all its Internet data, having an elimination service is excellent if you want to constantly monitor and automate the process of eliminating your information from hundreds of sites continuously for a longer period of time. See my best selections to obtain data disposal services here.

Kurt key takeway

This Vulnerability of iOS is a serious reminder of the importance of staying updated with software updates. If you are using a 2018 or later iPhone, be sure to update to iOS 17.2 or later as soon as possible. Computer pirates exploited a hidden defect for more than a year, using false media applications to access devices. While Apple has now repaired the problem, the fact that it remained without being detected for so long is worrying.

Click here to get the Fox News application

Do you think companies like Apple are doing enough to protect you from cyber threats? Get us knowing in Cyberguy.com/contact

To obtain more technological tips and safety alerts, subscribe to my free Cyberguy Report newsletter when you head Cyberguy.com/newsletter

Ask Kurt a question or let us know what stories we would like to cover.

Follow Kurt in his social channels:

Answers to Cyberguys most facts:

New Kurt:

Copyright 2025 Cyberguy.com. All rights reserved.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *