Press "Enter" to skip to content

Apple slams Google for causing havoc among iPhone Consumers

Apple has slammed Google for developing a false belief concerning its iPhones being at hacking threat due to safety flaws that supposedly let several malicious sites burst into its iOS functioning system.

Researchers working in Google’s Project Zero team had detected several hacked sites that utilized safety defects in iPhones to attack users who visited such sites — compromising their private files, messages, and real-time place information.

In a statement, Apple reported the so-called complicated assault was focused, maybe not a broad-based use of iPhones” en masse” as clarified.

“The assault affected fewer than a dozen sites which concentrate on content associated with this Uighur community. Irrespective of the scale of this assault, we consider the security and security of users extremely seriously,” that the Cupertino-based iPhone manufacturer said on Friday.

“Google’s article, issued six months following iOS patches were published, creates the false belief of’mass manipulation’ to track the personal activities of entire populations in real-time,’ stoking fear among most of iPhone users their apparatus were endangered. This was not true,” Apple said.

According to Google, the sites delivered their malware and were usable for several years.

As stated by the iPhone manufacturer, “all evidence suggests that these site attacks were only usable for a short period, approximately two weeks, maybe not two decades’ since Google suggests.”

Google’s Threat Analysis Group (TAG) found that there wasn’t any goal discrimination as merely seeing the hacked website was sufficient for the exploited host to assault the iPhone, and when it had been effective, put in a tracking implant.

Apple stated that it fixed the vulnerabilities in the query in February — functioning extremely quickly to solve the matter only ten days when it learnt about it.

“When Google approached us we were in the process of repairing the bugs that were exploited,” stated the firm, including its product security groups across the world are continuously iterating to introduce new protections and patch vulnerabilities after they are found.