The website that could get your lock code and how Apple fixed it

Hackers are increasingly managing in more peculiar ways to get the lock code out of our device, as you well know, encrypting an iPhone using a lock code makes it highly resistant to attacks, but not irreducible. In this case, Researchers showed Apple that they were able to crack the lock code using the iPhone's motion sensors. Faced with such a finding, Apple had no choice but to bow its head and launch a security patch that took into account the way in which web pages access the iPhone hardware without requesting permissions.

Engadget USA has decided to tell a curious anecdote regarding security in Cupertino, as we said in the introduction, researchers from the United Kingdom showed Apple how a malicious web page could take advantage of the motion sensors of our iPhone to detect with a 100 % of success what is our blocking code. In fact, according to the tests, they deciphered all of them. Researcher Maryam Mehrnezhad thus wanted to emphasize how web pages and apps can access our iPhone sensors without requesting permissions, something that does not happen with elements such as the location, the reel or the microphone.

However, Apple did not let it get lost among many other recommendations, in fact iOS 9.3 had a security patch dedicated only to this type of attack on our privacy, and that is our security against this type of maneuver has always been one of the strengths of the Cupertino company, something before which we can only applaud. However, cybercriminals and other types of criminals will continue to investigate new methods to access information that does not concern them, so that a responsible use of the device will always be the best security measure.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.