iOS 10.3 solves serious security bugs in Safari

iOS 10.3 is the latest version of the mobile operating system that the guys from Cupertino have been pleased to present to us yesterday. In fact, they have been in quite a hurry to continue working, and today the first betas of the next evolution in iOS have been presented. But the topic that brings you here today (and me, who basically live here), is another. Although this time we have noticed an improvement in performance, iOS updates hide news at security levels, and now we will save ourselves a serious security problem in Safari.

They have been researchers from Lookout who have come to the conclusion that the previous version of iOS allowed hackers with sufficient knowledge to access Safari from an iOS device and perform tasks without the express consent of the user. To do this, you just had to get users to enter a certain website, and they would enter a continuous loop and it would not allow you to navigate with iOS.

To make the browser unusable, they abused the "pop-ups", those messages that appear in the browser, like that classic of "you have been selected for an award" and that makes us so little funny. +

Although many do not know the method, to solve it you just have to go to the Safari settings section and clear cache and browsing history. A fairly simple procedure, but one that will no longer be necessary to execute thanks to iOS 10.3, it is natively solved in the operating system, and will thus foresee that no unsuspecting shits in the clutches of these unscrupulous who ask for a "ransom" in exchange for re-free your browser.

It is rare to see this type of practice on iOS, but more and more threats are stalking the internet world. At least Apple is still aware of this type of trifle.


You are interested in:
How to open recently closed tabs in Safari
Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.