Hackers able to access iPhone using the app “Contacts”. This is stated in the press release, Check Point, arrived in edition “Tapes.ru”.

According to experts, the hack device for iOS vulnerability in a SQLite database that stores the contacts. Hackers can embed malicious code in there, which then opens when the user, for example, will look for the right room. Thus attackers can steal passwords of users and their contacts, but to obtain full access to the management device.

Experts note that SQLite is the most widespread in the world of a database that is available on any operating system, personal computer and mobile phone. They use browsers such as Chrome, Firefox and Safari, as well as the Dropbox app.

Check Point warned Apple about its findings and hopes the study will encourage the international community on cyber security to address vulnerabilities in SQLite.

Read more •••

LEAVE A REPLY

Please enter your comment!
Please enter your name here