In the Apple was another wiretapping scandal in the app “Radio station” was found vulnerability that allows you to monitor an iPhone without the owner’s consent. As reported in the “Apple” of the company, while they have no data regarding the order, did someone abuse of a security hole for their own selfish purposes.

Spy game clock

The “smart” clock Apple Watch was discovered a vulnerability that allows you to listen to an iPhone user without his consent, according to TechCrunch. Apple acknowledged the bug and apologized for the inconvenience. As a result, the application of the “Walkie-talkie”, allowing to exploit the vulnerability, has been disabled until then, until the corresponding patch.

The app “Radio station” is available for all owners of Apple Watch operating system watch OS 5. As the name implies, it works as an ordinary radio set, the user squeezes the button and sends a message to the interlocutor. With a slight delay it arrives at the device of the second user, which likewise may send a reply. This feature works on the basis of audiozone of FaceTime.

In his official statement, Apple pointed to the fact that he knows about the vulnerability, and therefore decided to disable the “Radio” to fix a bug.

“Despite the fact that we have not abused anyone for this issue and what are the special conditions and prerequisites necessary for this purpose, we take the security and privacy of our users very seriously. We decided that disabling the application is the right solution, as this bug allows you to listen to conversations of other customers on the iPhone without their permission. We apologize for this incident and any inconvenience caused,” — said the press service of the company.

It is reported that “Radio” will remain on user devices until a suitable patch is released, but will not run at startup.

Interestingly, in January 2019, a similar vulnerability was discovered in the group FaceTime calls. Listen to the interlocutor, it was possible even before he takes the call. This bug applies to all owners of iPhone, iPad, or Mac, if the devices were installed the appropriate application.

Then Apple released an official statement in which he acknowledged the problem and promised to release a patch in the very near future.

“We know about this vulnerability and released a patch, which will be available along with a system upgrade before the end of this week,” said a company representative.

Interestingly, the bug first discovered by a teenager named Grant Thompson, who tried to contact Apple to report the problem but never received a response.

When this story was widely cited in media reports, Apple quickly released a patch and gave Thompson the program Bug Bounty when developers pay users for discovering critical bugs.

Apparently, in the case of “Walkie-talkie”, Apple, learned from their mistakes, work more efficiently and have disabled the vulnerable application before the users had suffered any damage.

All for the sake of advertising

In February of this year, Apple had another wiretapping scandal. Then the portal TechCrunch reported that the number of apps for iPhone secretly records all the information from the screen of a smartphone, without notifying the owner.

The number of companies found to have engaged in questionable data collection, called fashion brands Abercrombie & Fitch and Hollister, Air Canada and Singapore Airlines, hotel reservation service the company-the organizer of the travel, Expedia and others.

To collect information of the above applications used the service Glassbox, which allows you to record everything that happens on the screen, including touch and swipe user, and then re-play the recording to see how that person interacted with the program. Information collected from smartphone users, carefully collected and sent to third parties for analysis. Based on these data is generated by advertising, targeted at specific people.

In addition, users of these popular apps were not even aware of the surveillance, since the program did not request permission to collect data.

Read more •••


Please enter your comment!
Please enter your name here