t>

Apple releases security patches for older iPhones and iPads to protect against DarkSword tools


Apple has pushed security updates to older iPhones and iPads that protect against powerful hacking tools that can steal data from a person’s device.

The tech giant said on Wednesday that released iOS 18.7.7 and iPadOS 18.7.7 allowing more devices to “receive a critical Internet security feature called DarkSword.”

DarkSword is a hacking tool that can be used to jailbreak Apple devices running iOS 18.4 to 18.7 unless the user visits a website that contains malicious code, such as legitimate websites that have been compromised. The exploit steals a person’s device data, including their messages, browsing history, location data, and cryptocurrency, and uploads that data to a server hosted by hackers.

These tools have already been seen in other attacks on users in China, Malaysia, Turkey, Saudi Arabia, and Ukraine. But now that the materials are published onlinesecurity researchers warn that anyone can use it These hacking tools to target people with old Apple mobile software.

Apple says users of its latest software, iOS 26, have been protected for the past few weeks. The company has also released a new update for iOS 18 users with iPhones and iPads that cannot run the iOS 26 software.

But with Wednesday’s update, Apple has now issued the DarkSword update to millions of users who have default devices that can be updated to iOS 26 but have chosen not to update. Some users have chosen not to change it to avoid the new “water glass” look. has generated user complaints.

Wired reported on Wednesday that Apple is planning to release changes.

Apple customers who have updated the software automatically should receive the new software. Apple said its security feature, Lockdown Mode, also protects against DarkSword attacks. The company he told TechCrunch last week that they don’t know anything about effective government espionage against an Apple device that has Lockdown Mode.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *