Recently, the “Russia Today” website and many foreign technology websites reported that a senior information security researcher from Google has discovered major vulnerabilities in Apple mobile phones and other devices. You can get all your information without touching your mobile phone .
According to the researcher, the key to this vulnerability is a network protocol called AWDL by Apple. Currently Apple mobile phones, tablets, watches and other devices are using this network protocol. For example, Apple users can easily transfer photos and files to other Apple devices through AirDrop, which is based on this AWDL protocol.
Using this vulnerability, Google researchers spent 6 months successfully controlling an Apple mobile phone in the next room. The invasion process only takes about 2 minutes, you can access all the data on the phone, including browsing information, downloading photos, and even turning on the camera and microphone for surveillance and monitoring.
Researchers say that the hacker not only does not need to touch the device, he may have never seen the device he hacked . Even more frightening is that even if the user turns off the AWDL protocol, the hacker still has a way to reopen it. Not only Apple mobile phones, but other Apple devices can also be “controlled” by this method .
The researchers said that although it took him half a year to invade successfully. But users should not take it lightly. This process is much easier for a hacker team. Currently, Apple has fixed this vulnerability in the new system in May this year. However, Google’s researchers said that even after fixing it, Apple did not inform users of this vulnerability, and the users were completely unaware of the entire process.