More immediately, Apple needs to patch this specific flaw in iPhones and I would expect to see a priority fix released either in iOS 14.7 (which is currently in beta testing) or a dedicated iOS 14.6.1 security update. Given their stealthy nature we’re bound to see more such attacks,” he concludes. “Airborne attacks are new and an as-yet unaddressed threat vector. Consequently, the attack goes undetected by network security solutions and does not leave any trace in the forensics and networking logs.”Īmichai says that AirEye’s testing indicates MacBooks may also be vulnerable while format string flaws can also be written for Android, Windows and Linux devices. “Attack traffic can be sent over channels that are not used for corporate network traffic. “Since the attack traffic is not part of the corporate network, Firewalls, NACs and Secure WLANs do not protect against this type of attack and most traditional network security solutions remain completely oblivious to it,” Amichai explains. Will spoofing of WiFi hotspots become a genuine fear for smartphone and laptop users? Getty ImagesĪmichai warns that their research is still ongoing, but if hackers are able to spoof popular WiFi hotspots then iPhone owners would struggle to tell if the hotspot they join is about to nuke their device or plant software which could later infiltrate their home or work network.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |