While tech giant Apple has already launched its iPhone for this year, now, millions of other iPhones are at bay as both the new models as well as the older ones are open to a massive iOS security hole which has the potential to impact pretty much every iPhone that exists on the planet.
There had previously been reports that claimed that every iPhone which ran a version of iOS 6 or newer is vulnerable to remote attacks, and now, this problem has actually been confirmed by Apple to be very real.
So what is it that users have to be worried about? Well, it has been found out that there is a serious vulnerability in Apple’s iOS Mail app which has the potential to allow an attacker to remotely infect an iPhone and then gain control over such person’s inbox. It has also been found out that not only can such attacks happen without the knowledge of the owner of the iPhone, but they have been taking place for the better part of two years – as the very first attack was detected all the way back in January of 2018.
Must Read: OLX conducts online entrepreneurship training for 28 business startups based in Peshawar
Moreover, even further bad news follows as it has also been revealed that such attacks are actually easier to perform on iOS 13 when compared with the previous generations. With iOS 12 or some other previous generation, an attacker requires the iPhone user to open a malicious email. However, one the other hand, with the iOS 13, the attack can be triggered without any assistance from the user – all the user would have to do is to have the mail app open unassisted in the background.
There is some good news as well, though. Apple has recently confirmed that it has managed to patch the vulnerability in the latest iOS 13.4.5 beta and now, by the looks of it, the company will also be taking a step forward by accelerating the release process. For the meantime though, if you too are worried over being on the receiving end of such an attack, then it would be advisable for you to disable the Mail app and use a third-party app instead.