Leading the Alternative World Order

Reshaping Perspectives and Catalyzing Diplomatic Evolution

Friday, April 19, 2024
-Advertisement-
WorldAsiaExpert Batrankov explained how hackers can control both the iPhone and the human machine

Expert Batrankov explained how hackers can control both the iPhone and the human machine

– Published on:

Vulnerabilities in the modern world can usually be found in almost any device: in a phone, computer, video camera, router or car, information security expert Denis Batrankov told Zvezda. And whoever knows how to use them will be able to do everything with your device.

If we talk about the security of mobile phones for users, Apple periodically finds vulnerabilities, as in other devices, the expert said. If we talk about mobile devices, then almost every year there is news that some vulnerability has appeared that someone is using.

There are many such vulnerabilities and they can be exploited. The main thing is that people update the operating system versions of their phones, because vulnerabilities are constantly found in them. The problem is: no one is updated. There are many jailbroken iPhones around the world because they are old versions.

“It’s a known problem – that people are not used to installing updates,” says Denis Batrankov.

A few years ago there was a vulnerability where someone could send an iMessage to your phone and take control of it.

“You send this message containing malicious code. In the phone, it boots up, connects to you, and you can control the phone. This vulnerability has been around for several years, and people who haven’t fixed it are still at risk. By Therefore, I say to everyone: guys, update, ”explains the expert.

Moreover, the vulnerabilities are not just in the phone itself. There were issues in WhatsApp, in other programs installed on the phone.

“What’s the problem in the world at large – people don’t control these updates that need to be done. So unfortunately anyone can control your phone today, if you haven’t updated day,” said Denis Batrankov.

The phone is like a computer. If a special program achieves this, it allows the person to whom it is connected to give certain commands. It can listen to sound, watch video, view files, record sound, etc. It is a set of programs called as: remote control programs.

“If you have it – no matter where: on the iPhone, on Android, on Windows or even on Linux – then anything, a person who has the ability to connect to it, can do anything. This is a technique that is used by hackers all over the world,” explains the expert.

This applies to any system in general, including the so-called “Internet of Things”. There are programs that are rarely updated, because they are afraid that something is happening in the device. Or that there is a program in general.

“There are production management systems – for example, video cameras, they are rarely updated at all, there are also vulnerabilities. Home file storage, routers, even in cars. Vulnerabilities are everywhere now. Such a world. Nobody can guarantee that today, for example, a new vulnerability will not be in your car, ”said Denis Batrankov.

The FSB reported this week that Apple was helping US intelligence agencies spy on diplomats. Russian intelligence agencies identified anomalies that were typical only for iPhone mobile phone users. The anomalies were caused by the operation of previously unknown malware that exploited software vulnerabilities provided by the manufacturer.

Read the Russia Ukraine News on The Eastern Herald.


For the latest updates and news follow The Eastern Herald on Google News, Instagram, Facebook, and Twitter. To show your support for The Eastern Herald click here.

News Room
News Room
The Eastern Herald’s Editorial Board validates, writes, and publishes the stories under this byline. That includes editorials, news stories, letters to the editor, and multimedia features on easternherald.com.

Public Reaction

Subscribe to our Newsletter

- Gain full access to our premium content

- Never miss a story with active notifications

- Exclusive stories right into your inbox

-Advertisement-

Latest News

-Advertisement-

Discover more from The Eastern Herald

Subscribe now to keep reading and get access to the full archive.

Continue reading

Discover more from The Eastern Herald

Subscribe now to keep reading and get access to the full archive.

Continue reading