AirDrop and WiFi used to hack iPhone – is your iPhone safe? What are the alternatives?
As we have previously discussed, smartphone hacks are becoming more sophisticated making mobile security more difficult to maintain. Is the only answer an unhackable phone?
Previously, hacks would often rely on the users making certain errors, such as clicking on a link or opening an attachment in order to activate some malicious files. Once opened, the files would then gain access to sensitive data or personal information. Read just how this happened to Jeff Bezos’ iPhone.
However, a recent report has highlighted a flaw that was discovered on Apple iPhones that allowed a hack to take place over its WiFi connection. It appeared that the hacker was able to exploit a flaw in the technology Apple uses for its AirDrop feature.
This hack gave access to information including:
- Text Messages
The iPhone hack also, disturbingly, gave access to the phone’s microphone and camera. Clearly this would create a serious security and privacy breach.
This is a significant discovery for a number of reasons. Firstly, it is an example of how the technology itself can be exploited. But it also shows that, with people increasingly using their smartphones to hold more and more data and information about their business and personal lives, security must be at the forefront of their online concerns.
In line with normal white hacks process, the organisations that have successfully hacked a device do not make their findings public until the manufacturer has had the opportunity to fix the flaw. In this case, the security breach was discovered around 6 months ago and Apple have fixed the issue.
The initial course of action is to avoid all public WiFi systems to help limit the opportunities for a hacker to exploit any weaknesses.
However, businesses and their employees will need to go further to help ensure their smartphones are kept secure and their communications remain private.
Need an unhackable phone?
The Blackphone PRIVY has security features specially designed to keep business leaders and their employees safe from hackers. These include:
- PGP Email
- End to end encryption
- Incognito made
- Encrypted storage
- Wiretap Secure
- Locked Bootloader
As each new story comes out showing that some of the most popular smartphones with the public are at risk of being hacked, further goes to illustrate the importance of securing your communications with the right equipment.
If you are a business executive and are looking at shoring up your mobile communications, please get in touch and we can help that security become a reality.