1 February 2025

generally, IPhone devices are safer From Android devices.

Apple closed environmental policies and strict applications policies limit the risk of malware, and central software updates include better security. On the other hand, Android opens to users allow users to install applications from different sources, and updates are often put forward at different times, making them more vulnerable to attacks.

However, iPhone devices are not immune to security defects. Sometimes infiltrators find ways To exploit them, as it appears in the latest Apple consultant. The company recently discovered that IOS has been exploited for more than a year. While a reform has now been issued, reports indicate that infiltrators may have already targeted high -value individuals.

Get security alerts, expert advice – Subscribe to the KURT newsletter – the Cyberguy report here

Woman with the phone

A woman on her iPhone. (Cyberguy “Knutsson)

What you need to know

An apple for her Detect Holders who take advantage of a loophole in iOS that seem to have been in place for more than a year. Weakness is a “zero day” defect, which means that criminals may have already exploited it, according to the last consultant security consultant from the company. Disadvantages on a zero day are especially dangerous because they are exploited before developers can issue repairs. Apple confirmed that this is the first zero -day area of ​​2025. Weakness affects iPhone devices dating back to the 2018 XS, as well as the latest iPad, MACS, and even the Vision PRO headset.

The weakness, followed as CVE-2025-24085, lies within the basic media of Apple, a The software layer responsible for processing multimedia files. The “free dimension” error enabled the memory infiltrators to process the system to implement an unstable symbol, and give them high privileges to bypass safety protocols. Apple consultant suggests that infiltrators have a defect weapon through harmful harmful applications as legal media operators. These applications may have offended the basic media frame by running damaged files, allowing attackers to infiltrate the devices.

According to the attacks of the IOS versions that preceded 17.2, it was released in December 2023, which means that weakness may be active since late 2022. Security experts speculate that infiltrators are focusing on high-value individuals-such as activists, executives, or journalists-to avoid Detection. The prolonged ghost in the campaign emphasizes the challenges of identifying sophisticated tightly designed exploits.

This emphasizes the decisive need for you to update your devices to iOS 17.2 or later, as these versions include basic reforms to protect from this active useful weakness.

IOS weakness 2

The Apple iOS 17.2 update guarantees corrections for many weaknesses. (Cyberguy “Knutsson)

How to protect iPhone and iPad from harmful programs

Apple's response to weakness

In response, Apple has released repairs via its ecosystem, including iOS 18.3, MacOS Sequoia, Watchos, TVOS and Visionos. You must update your devices as soon as possible to stay protected. To install the update on the iPhone or iPad:

  • Go to Settings.
  • handle general.
  • Click Program update.
  • Click Update now or Tonight update.

For advice: I recommend you to click Update now As well as running Automatic updates To stay covered in the future.

What is artificial intelligence (AI)?

IOS weakness 3

Steps to update the program on iPhone. (Cyberguy “Knutsson)

Although Apple has corrected this problem, it is a reminder that staying on top of the updates is the key. The infiltrators are always looking for safety gaps, so keeping your program updated is one of the best ways to stay safe.

The fraudsters found a hovercraft method to overcome the safety features of your iPhone

7 Ways to keep your iPhone safe

Protecting your iPhone requires proactive safety measures. By following these seven basic steps, you can significantly reduce the risk of electronic threats and maintain the safety of your personal information.

1. Keep updated your iPhone: I can't say this enough. Update your iPhone It is regularly one of the most effective ways to protect it from security threats. Apple launches updates often determine weaknesses, including critical defects on the zero day.

2. Download apps only from the application store: To reduce the risk of installing malware, download only applications from the official application store. Apple's strict applications are helped prevent harmful applications, but some sliding threats can still be. Always check the details of the application, check the reviews and be careful about the application permissions before installation.

3. Enable the lock mode for additional protection: For those of you who may be in greater danger, such as journalists or executives, Lock It provides an additional layer of safety. This feature limits the functions of certain devices to prevent advanced electronic attacks. It can be turned around Settings > Privacy and security > Lock It is especially useful for those concerned with targeted threats.

4. Enable the liquidation of messages: Use the compact filter options for your device to sort the messages from unknown messengers. This feature allows you to automatically sorting the messages from unknown messengers, liquidating unacceptable messages easily and managing your inbox more efficiently. Below steps:

  • Open Settings.
  • Passing down and clicking Applications.
  • handle Messages.
  • employment Liquidation of unknown messengers

Get Fox Business on the Go by clicking here

5. Keep careful of hunting attacks and install strong antivirus programs: Hunting One of the most common tactics is still used by infiltrators. Be careful when receiving unwanted email messages or messages on your iPhone, especially those that have suspicious links or attachments. Always check the sender before opening anything. The best way to protect yourself from malicious links that prove harmful programs, which may reach your own information, is to install antivirus program on all your devices. This protection can also be alerted to relieving emails and fraud on Ransomwari, and maintaining your personal information and digital assets. Get my choices for the best winners to protect antivirus 2025 for Windows, Mac, Android and iOS devices.

6. Review your safety and privacy settings: IPHONE security settings can help you regularly maintain strong protection. You must also review the application permissions in Settings> Privacy and Security To restrict access to sensitive data, such as the site or contacts. maybe Facial ID or touch ID For safe arrival and running dual -factor authentication (2FA) For Apple and other accounts. 2FA It adds an additional layer of safety to your accounts by requesting another form of verification, such as a text message or authentication, as well as your password. This greatly reduces the risk of unauthorized access, even if your password is penetrated.

7. Invest in personal data removal services: By reducing your internet mark, you make it difficult for Internet criminals to get your contact information, which may prevent them from sending deceptive fishing texts for you and email messages in the first place. Although there is no service to remove all of your data from the Internet, get a great order removal service if you want to monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check the best data removal choices here.

Court Kisa Curt

This powerful security vulnerability is a serious reminder of the importance of staying up to update with software updates. If you are using iPhone from 2018 or later, be sure to update it to iOS 17.2 or newer as soon as possible. The infiltrators used a hidden defect for more than a year, using counterfeit media applications to access devices. Although Apple has now corrected the problem, the fact that it has been not discovered for a long time is related.

Click here to get the Fox News app

Do you think companies like Apple do enough to protect you from Internet threats? Let's know through our writing in Cyberguy.com/contact

For more technical advice and security alerts, participated in the free newsletter of Cyberguy Report by going to Cyberguy.com/newsledter

Ask Kurt a question or tell us about the stories you want to cover.

Follow Court on his social channels:

Answers to the most asked Cyberguy questions:

New from Court:

Copyright 2025 Cyberguy.com. All rights reserved.

Leave a Reply

Your email address will not be published. Required fields are marked *