FaceTime vulnerability apparently known for several days> iphone-ticker.de



[ad_1]

Apple was aware of the vulnerability announced on Tuesday night, FaceTime, which allowed callers to listen to the call without his intervention and before accepting the call, apparently several weeks before.

FYI-I called, sent a FB message, a fax, an e-mail and a full tweet to Apple last week, without success. Official bug report submitted. Tried to keep it private b / c security concerns. Never heard from them.

– MGT7 (@ MGT7500) January 29, 2019

Leave this conclusion many interventions in the Twitter short message service portal too. Here you will find, among other things, the tweets of the user @ MGT7500, which Apple pointed out on January 21 on vulnerability and has turned almost acclaimed to the @ Apple Support and @ Timook:

My teenager has discovered a big security problem in the new iOS from Apple. He can listen to his iPhones and tablets without permission. I have a video of it. An error report has already been submitted to @AppleSupport … I'm waiting for an answer to reveal more details. Scary stuff! #apple #bugreport @foxnews

@tim_cook The error is real … I try to attract the attention of Apple, so you are active here. I am only the mother of a teenager who has discovered a huge problem in her new update. I confirmed it myself … someone from Apple should answer us.

We reported that audio and video connections came from roundabout Fixed a problem that allowed unauthorized access to the camera and microphone of foreign iPhones.

So, even though Apple had been aware of the FaceTime vulnerability for more than a week, the group stopped the group 's call servers only after the wave of attention. on the web that went through the network on Tuesday night. Meanwhile, the Twitter user @ MGT7500 even reported that Apple had reported the error with targeted email communications.

I called Apple in vain last week, notified by fax, email and Twitter. I have also submitted an official bug report. […] I have not received any feedback so far.

[ad_2]
Source link