www.cbc.ca
Open in
urlscan Pro
23.32.58.182
Public Scan
Submitted URL: https://s2.bl-1.com/h/drmg9BfZ?url=https://www.cbc.ca/news/business/apple-security-flaw-full-control-1.6556039
Effective URL: https://www.cbc.ca/news/business/apple-security-flaw-full-control-1.6556039
Submission: On August 20 via manual from US — Scanned from DE
Effective URL: https://www.cbc.ca/news/business/apple-security-flaw-full-control-1.6556039
Submission: On August 20 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOM<form class="searchForm">
<div class="search-autocomplete">
<div id="gn-compact-search-suggestions-status" class="a11y" role="status" aria-atomic="true" aria-live="polite"></div><input type="search" id="gn-compact-search" class="searchInput" name="query" placeholder="Search CBC.ca" aria-haspopup="listbox"
autocomplete="off" autocorrect="off" aria-autocomplete="both" aria-controls="gn-compact-search-autocomplete" aria-describedby="gn-compact-search-autocomplete-assistiveHint" aria-label="Search CBC.ca"><span class="a11y"
id="gn-compact-search-autocomplete-assistiveHint">When search suggestions are available use up and down arrows to review and enter to select.</span>
</div><button class="searchButton">Search</button>
</form>
Text Content
Skip to Main ContentAccessibility Help Menu When search suggestions are available use up and down arrows to review and enter to select. Search Search Sign In QUICK LINKS * News * Sports * Radio * Music * Listen Live * TV * Watch * news * Top Stories * Local * COVID-19 * Climate * World * Canada * Politics * Indigenous * Opinion * The National * Business * Health * Entertainment * Science * CBC News Investigates * Go Public * About CBC News * Being Black in Canada * More * The National * Business * Health * Entertainment * Science * CBC News Investigates * Go Public * About CBC News * Being Black in Canada Apple security flaw allows hackers to fully control iPhones, iPads and Macs | CBC News Loaded Business APPLE SECURITY FLAW ALLOWS HACKERS TO FULLY CONTROL IPHONES, IPADS AND MACS Apple disclosed serious security vulnerabilities for iPhones, iPads and Macs that could potentially allow attackers to take complete control of these devices. SOCIAL SHARING * Facebook 0 * LinkedIn 0 * Twitter 0 * Email 0 * Reddit 0 INTRUDERS CAN IMPERSONATE DEVICE'S OWNER AND RUN ANY SOFTWARE IN THEIR NAME The Associated Press · Posted: Aug 19, 2022 8:49 AM ET | Last Updated: August 19 An Apple iPhone 13 is displayed on their first day of sale, in New York, on Sept. 24, 2021. Apple disclosed serious security vulnerabilities on Wednesday for iPhones, iPads and Macs that could potentially allow attackers to take complete control of these devices. (Richard Drew/The Associated Press) 1068 comments Apple has disclosed serious security vulnerabilities for iPhones, iPads and Macs that could potentially allow attackers to take complete control of these devices. Apple released two security reports about the issue on Wednesday, although they didn't receive wide attention outside of tech publications. Apple's explanation of the vulnerability means a hacker could get "full admin access" to the device. That would allow intruders to impersonate the device's owner and subsequently run any software in their name, said Rachel Tobac, CEO of SocialProof Security. According to the security reports, the vulnerabilities impacted Apple's WebKit, which is the engine that powers the Safari web browser and other browsers on iOS; and the kernel, Apple's core computer operating system. Security experts have advised users to update affected devices — the iPhone6S and later models; several models of the iPad, including the 5th generation and later, all iPad Pro models and the iPad Air 2; and Mac computers running MacOS Monterey. The flaw also affects some iPod models. Apple did not say in the reports how, where or by whom the vulnerabilities were discovered. In all cases, it cited an anonymous researcher. WATCH | Why tech companies are ditching passwords: APPLE, GOOGLE, MICROSOFT WANT TO DITCH PASSWORDS TO IMPROVE SECURITY 3 months ago Duration 2:04 Tech giants Apple, Google and Microsoft have announced they're working on implementing passwordless sign-on technology, allowing users to more securely log into mobile, desktop and browser apps using their smartphones without a standard password. Commercial spyware companies such as Israel's NSO Group are known for identifying and taking advantage of such flaws, exploiting them in malware that surreptitiously infects targets' smartphones, siphons their contents and surveils the targets in real time. In July 2021, Apple released a similar security point that said that a flaw in its security design was being "actively exploited." Again, an anonymous researcher was credited for the discovery. NSO Group has been blacklisted by the U.S. Commerce Department. Its spyware is known to have been used in Europe, the Middle East, Africa and Latin America against journalists, dissidents and human rights activists. Security researcher Will Strafach said he had seen no technical analysis of the vulnerabilities that Apple has just patched. The company has previously acknowledged similarly serious flaws and, in what Strafach estimated to be perhaps a dozen occasions, has noted that it was aware of reports that such security holes had been exploited. WATCH | Serious security flaw exposed: APPLE URGING USERS TO UPDATE DEVICES DUE TO SECURITY FLAW 20 hours ago Duration 2:07 Apple is warning customers to update the software on their iPhones, iPads and Mac computers due to a security flaw that could allow hackers to take control of their devices. "Yes, hackers, threat actors can take control of devices," said Daniel Tobok, the CEO of Toronto-based cybersecurity firm Cypfer, in an interview with CBC News. The devices most vulnerable to targeted attacks are the ones that aren't up-to-date on security patches, which is about 18 per cent of devices globally, according to Tobok. Apple reveals security flaws more or less on an annual basis, particularly after the flaws have been detected by what Tobok calls "threat actors," or hackers. * U.S. communications regulator wants TikTok removed from app stores over spying concerns * Americans are being urged to delete period tracking apps. Should Canadians do the same? * Apple issues security patch after Toronto-based Citizen Lab flags vulnerability Typically, hackers will gain access to a device and then change its passwords so that the user is locked out of their own phone or laptop. But it's extremely difficult for users to detect when their device has been compromised, he said. "When you have a super power, privileged user on the phone, they could potentially do things without you even noticing," Tobok said. "This is really one of the dangers of having a device that is compromised because, unlike Hollywood, you don't see icons flashing and you don't see your red lights bleeping." "You're really not aware because what the threat actors are doing is moving very quietly, just exfiltrating your data or leveraging your phone as a hub for committing another potential crime." WATCH | Security flaw shows how tech can be weaponized: PEOPLE COMING TO GRIPS WITH DEVICE VULNERABILITY, SAYS CYBERSECURITY ANALYST 1 day ago Duration 5:35 Ritesh Kotak, a cybersecurity analyst, says the recent security flaw discovered in Apple devices demonstrates how any kind of personal information placed on electronic devices is vulnerable and can be 'weaponized.' With files from CBC's Nisha Patel CBC's Journalistic Standards and Practices|About CBC News Corrections and clarifications|Submit a news tip|Report error RELATED STORIES * Americans are being urged to delete period tracking apps. Should Canadians do the same? * U.S. communications regulator wants TikTok removed from app stores over spying concerns * Spyware used on separatists in Spain 'extensive,' Canadian cybersecurity group's investigation reveals COMMENTS To encourage thoughtful and respectful conversations, first and last names will appear with each submission to CBC/Radio-Canada's online communities (except in children and youth-oriented communities). Pseudonyms will no longer be permitted. By submitting a comment, you accept that CBC has the right to reproduce and publish that comment in whole or in part, in any manner CBC chooses. Please note that CBC does not endorse the opinions expressed in comments. Comments on this story are moderated according to our Submission Guidelines. Comments are welcome while open. We reserve the right to close comments at any time. BECOME A CBC MEMBER Join the conversation Create account Already have an account?Log in Newest Most Liked 1. Oldest 2. Most Liked 3. Most Replies 4. Most Active 5. Editor's Pick 1068 Comments 0 Commenting is now closed for this story. ← Show all comments Show More FOOTER LINKS MY ACCOUNT * Profile * CBC Gem * Newsletters * About CBC Membership CONNECT WITH CBC * Facebook * Twitter * YouTube * Instagram * Mobile * RSS * Podcasts CONTACT CBC * Submit Feedback * Help Centre Audience Relations, CBC P.O. Box 500 Station A Toronto, ON Canada, M5W 1E6 Toll-free (Canada only): 1-866-306-4636 ABOUT CBC * Corporate Info * Sitemap * Reuse & Permission * Terms of Use * Privacy * Jobs * Our Unions * Independent Producers * Political Ads Registry * AdChoices SERVICES * Ombudsman * Corrections and Clarifications * Public Appearances * Commercial Services * CBC Shop * Doing Business with Us * Renting Facilities * Radio Canada International ACCESSIBILITY It is a priority for CBC to create a website that is accessible to all Canadians including people with visual, hearing, motor and cognitive challenges. Closed Captioning and Described Video is available for many CBC shows offered on CBC Gem. * About CBC Accessibility * Accessibility Feedback * * ©2022 CBC/Radio-Canada. All rights reserved. * Visitez Radio-Canada.ca now -------------------------------------------------------------------------------- CBC Caffeine Player 17.16.5 INFORMATION ABOUT COOKIES Please know that cookies are required to operate and enhance our services as well as for advertising purposes. We value your privacy. If you are not comfortable with us using this information, please review your settings before continuing your visit. Learn moreClose