Billions of iPhone users at risk of dangerous malware attack — newly-found flaw warning issued

Importance Score: 75 / 100 🔴

iPhone and iPad owners are encouraged to hastily upgrade their hardware after cybersecurity researchers discovered a critical vulnerability that could enable cybercriminals to infiltrate their apparatus.

Dubbed “AirBorne,” this issue permits malicious actors to install harmful software, access confidential information, or even listen in on discussions when devices are connected to the same wireless network, such as those found in public spheres like air terminals, cafes, or even work environments.

AirPlay Vulnerability Exposed

To thwart potential breaches, users should promptly update all connected devices to the newest software versions, particularly those enabled for AirPlay.

Disable AirPlay When Not in Use

It is also advisable to deactivate the AirPlay feature when idle, as it can serve as an entry point for hackers to potentially commandeer the device.

p>

Furthermore, unused devices, such as a dormant Bluetooth speaker, could present another avenue for unauthorized access.

“Due to the widespread support of AirPlay across numerous devices, many will take years to receive patches, or they may never be patched,” Gal Elbaz, chief technology officer and co-founder of Tel Aviv-based cybersecurity firm Oligo, stated.

“This is all because of vulnerabilities within a single piece of software that impacts everything.”

Details of the Vulnerability

The identified flaws, totaling 23, reside within Apple’s AirPlay protocol and software development kit (SDK), facilitating the transfer of photos, music, and videos between devices.

Although Apple has issued security patches to rectify the issue on their products, countless third-party gadgets—ranging from smart TVs to set-top boxes and automobile systems—may remain compromised if their manufacturers have yet to implement the fixes.

Potential Security Risks

This implies that even with an updated iPhone, a connected speaker or television could act as a backdoor, which attackers favor.

“If a cybercriminal can access the same network as one of these devices, they can seize control and exploit it as a foothold to reach other connected systems,” Elbaz cautioned.

Responses from Cybersecurity Experts

Cybersecurity specialist Patrick Wardle, CEO of Apple-focused security firm DoubleYou, also emphasized to the outlet that such third-party weaknesses are frequently disregarded by users—and by the entities that created them.

“Once third-party producers integrate Apple technologies like AirPlay through an SDK, Apple no longer possesses direct authority over the hardware or the patching procedure,” Wardle explained.

Consequently, he elaborated, if third-party vendors procrastinate—or skip updates entirely—it could leave consumers vulnerable and potentially erode confidence in the comprehensive “Apple ecosystem.”


🕐 Top News in the Last Hour By Importance Score

# Title 📊 i-Score
1 Trump’s dispute with Musk shows the danger of private monopolies in space 🟢 85 / 100
2 Netflix viewers in tears as new Grenfell fire documentary leaves them 'heartbroken' 🔴 75 / 100
3 Your passwords have probably been stolen and sold on the dark web 🔴 75 / 100
4 Dark web's longest-standing drug market worth £200million is busted with 30-year-old German 'Big Boss' mastermind arrested in Barcelona after global police operation 🔴 75 / 100
5 Where does your stolen car end up? The parts of the world criminal gangs typically transport them to 🔴 65 / 100
6 Netflix star Sara Burack killed in Hamptons hit-and-run crash 🔴 65 / 100
7 Doctors issue warning as common sleep habit is linked to risk of early death in major study 🔴 65 / 100
8 UK Scientist tells anyone with sparrows in garden to 'take action now' 🔵 45 / 100
9 Man United tipped to swoop for Emi Martinez as Aston Villa goalkeeper remains open to leaving club this summer – with LaLiga club also interested in the World Cup winner 🔵 45 / 100
10 Singer Chris Brown pleads not guilty in London assault case 🔵 45 / 100

View More Top News ➡️