How easy is it to hack the iPhone? Now whether it is iPhone XR or iPhone XS, these phones run on iOS 12. There are often reports of Android phone hacking, viruses, malware, etc., but is best known for iPhone security. Google’s Project Zero, a team of cybersecurity researchers, has reported that they found an exploit earlier this year, which showed that the iPhone could be hacked through a website.
If iPhone users open a Malicious website through the Safari browser, then the phone can be hacked. This bug is so serious that hackers can load the monitoring code in the iPhone as soon as the website is opened. With this, hackers can track the user and also keep an eye on their activities.
The Google Threat Analysis Group received a small collection of hack websites earlier this year. In this, only by opening that website, the device could be attacked. According to the group’s recommendation, thousands of visitors to these sites visited each week.
It is believed that Project Zero has the staff of the best cybersecurity experts and finds serious security bugs in tech products made by Har Gogol and for other companies such as Apple and Microsoft. In simple words, if you use an iPhone, then make sure that you are using iOS 12.1.4 or newer.
Earlier this year, Google cybersecurity experts “discovered a small collection of hacked websites” that exploited vulnerabilities in Apple’s (AAPL) smartphone software, Ian Beer, a researcher with Google’s Project Zero.
The implant was capable of giving hackers access to iPhone users’ contacts, photos, and location, as well as data from apps like iMessage, WhatsApp, Telegram, Gmail and Google Hangouts, according to the Project Zero researchers.
The Google (GOOGL) researchers discovered “a total of fourteen vulnerabilities,” half of them linked to the iPhone’s web browser. They informed Apple of the vulnerabilities on February 1, prompting the company to issue a software update six days later when it admitted certain applications could potentially “gain elevated privileges” and “execute arbitrary code.”