{"id":4337,"date":"2023-11-29T17:22:03","date_gmt":"2023-11-29T17:22:03","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=4337"},"modified":"2023-12-03T18:02:41","modified_gmt":"2023-12-03T18:02:41","slug":"hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/","title":{"rendered":"Hackers Exploit Apple Security Flaw, Take Complete Control of Devices!"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<p><strong>Apple Security &#8211; Actively Exploited &#8211;<\/strong> Apple enthusiasts, we&#8217;ve got some crucial news: there&#8217;s a pressing need to update your iPhones, iPads, and Macs ASAP. Two security vulnerabilities have surfaced, posing a serious threat by granting attackers complete control over your beloved Apple devices. The urgency here is real, as credible reports confirm that hackers are already exploiting these vulnerabilities.<\/p>\n<h3>Identifying the Vulnerabilities<\/h3>\n<p>Let&#8217;s break it down. The first vulnerability dives deep into the operating system&#8217;s core, affecting the kernel\u2014the shared layer across all Apple devices. The second vulnerability targets WebKit, the underlying technology powering the Safari web browser. Apple has acknowledged that these issues have already seen active exploitation by hackers, though specific details remain undisclosed. The disclosure of these vulnerabilities comes courtesy of an anonymous researcher or group.<\/p>\n<p>If you&#8217;re rocking an iPhone from 2015 onward, an iPad released since 2014, or a Mac running macOS Monterey, it&#8217;s time to take action. Navigate to your settings menu on mobile or select &#8220;software update&#8221; in the &#8220;about this Mac&#8221; section on your computer to download the critical update.<\/p>\n<h3>Expert Insights about Apple Security Flaw<\/h3>\n<p>Rachel Tobac, CEO of <a href=\"https:\/\/www.socialproofsecurity.com\/\" target=\"_blank\" rel=\"nofollow noopener\">SocialProof Security<\/a>, breaks it down for us: these vulnerabilities could hand a hacker &#8220;full admin access to the device,&#8221; essentially allowing them to execute code as if they were you. That&#8217;s serious business.<\/p>\n<p>Now, who needs to be especially vigilant? Activists, journalists, anyone in the public eye\u2014the targets of sophisticated nation-state spying. Updating your software is not just a suggestion; it&#8217;s a security imperative.<\/p>\n<h3>Zero-Day Bugs and Dark Web Transactions<\/h3>\n<p>Until the fix rolled out, these vulnerabilities fell under the &#8220;zero-day&#8221; category, meaning there was <a href=\"https:\/\/secry.me\/explore\/category\/news\/\">zero days<\/a> of protection against them. On the dark web, these vulnerabilities are currency, fetching hundreds of thousands, even millions of dollars. Zerodium, a notable cyberweapon broker, is willing to pay up to $500,000 for a Safari exploit and up to $2 million for a fully developed iPhone-hacking malware.<\/p>\n<h3>Commercial Spyware and Government Involvement<\/h3>\n<p>Enter commercial spyware companies like NSO Group, notorious for exploiting such vulnerabilities. Governments, especially in Europe and North America, are the big spenders here. NSO Group&#8217;s spyware, though bl*cklisted by the US commerce department, has a notorious history of targeting journalists, dissidents, and human rights activists across Europe, the Middle East, Africa, and Latin America.<\/p>\n<p>Security researcher Will Strafach highlights the seriousness of these vulnerabilities, stressing the lack of technical analysis. Apple, while patching these flaws, has faced similar challenges in the past, with reports of exploitation emerging on numerous occasions. Stay vigilant, update your devices, and keep the hackers at bay.<\/p>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Apple Security &#8211; Actively Exploited &#8211; Apple enthusiasts, we&#8217;ve got some crucial news: there&#8217;s a pressing need to update your iPhones, iPads, and Macs ASAP. Two security vulnerabilities have surfaced, posing a serious threat by granting attackers complete control over your beloved Apple devices. The urgency here is real, as credible reports confirm that hackers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4355,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[194],"tags":[401,364,402,403,267,214],"class_list":{"0":"post-4337","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"tag-apple","9":"tag-apple-security","10":"tag-iphone","11":"tag-socialproof","12":"tag-threat","13":"tag-tips-and-tricks"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hackers Exploit Apple Security Flaw, Take Complete Control of Devices! | SECRY<\/title>\n<meta name=\"description\" content=\"Apple Security - Actively Exploited - Apple enthusiasts, we&#039;ve got some crucial news: there&#039;s a pressing need to update your iPhones, iPads, and Macs\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Exploit Apple Security Flaw, Take Complete Control of Devices! | SECRY\" \/>\n<meta property=\"og:description\" content=\"Apple Security - Actively Exploited - Apple enthusiasts, we&#039;ve got some crucial news: there&#039;s a pressing need to update your iPhones, iPads, and Macs\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-29T17:22:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-03T18:02:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/11\/Apple-iOS-14_-3-Awesome-New-iPhone-Security-Features-Youll-Want-Now-%E2%80%94-Forbes.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"735\" \/>\n\t<meta property=\"og:image:height\" content=\"490\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/acc5b116f6d4870e1ecd6928630104f5\"},\"headline\":\"Hackers Exploit Apple Security Flaw, Take Complete Control of Devices!\",\"datePublished\":\"2023-11-29T17:22:03+00:00\",\"dateModified\":\"2023-12-03T18:02:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\\\/\"},\"wordCount\":439,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Apple-iOS-14_-3-Awesome-New-iPhone-Security-Features-Youll-Want-Now-\u2014-Forbes.jpeg\",\"keywords\":[\"Apple\",\"Apple Security\",\"Iphone\",\"SocialProof\",\"Threat\",\"Tips and Tricks\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\\\/\",\"name\":\"Hackers Exploit Apple Security Flaw, Take Complete Control of Devices! | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Apple-iOS-14_-3-Awesome-New-iPhone-Security-Features-Youll-Want-Now-\u2014-Forbes.jpeg\",\"datePublished\":\"2023-11-29T17:22:03+00:00\",\"dateModified\":\"2023-12-03T18:02:41+00:00\",\"description\":\"Apple Security - Actively Exploited - Apple enthusiasts, we've got some crucial news: there's a pressing need to update your iPhones, iPads, and Macs\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Apple-iOS-14_-3-Awesome-New-iPhone-Security-Features-Youll-Want-Now-\u2014-Forbes.jpeg\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Apple-iOS-14_-3-Awesome-New-iPhone-Security-Features-Youll-Want-Now-\u2014-Forbes.jpeg\",\"width\":735,\"height\":490,\"caption\":\"Apple Security Flaw Actively Exploited by Hacker to Takeover Devices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Exploit Apple Security Flaw, Take Complete Control of Devices!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/acc5b116f6d4870e1ecd6928630104f5\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hackers Exploit Apple Security Flaw, Take Complete Control of Devices! | SECRY","description":"Apple Security - Actively Exploited - Apple enthusiasts, we've got some crucial news: there's a pressing need to update your iPhones, iPads, and Macs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Exploit Apple Security Flaw, Take Complete Control of Devices! | SECRY","og_description":"Apple Security - Actively Exploited - Apple enthusiasts, we've got some crucial news: there's a pressing need to update your iPhones, iPads, and Macs","og_url":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2023-11-29T17:22:03+00:00","article_modified_time":"2023-12-03T18:02:41+00:00","og_image":[{"width":735,"height":490,"url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/11\/Apple-iOS-14_-3-Awesome-New-iPhone-Security-Features-Youll-Want-Now-%E2%80%94-Forbes.jpeg","type":"image\/jpeg"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/acc5b116f6d4870e1ecd6928630104f5"},"headline":"Hackers Exploit Apple Security Flaw, Take Complete Control of Devices!","datePublished":"2023-11-29T17:22:03+00:00","dateModified":"2023-12-03T18:02:41+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/"},"wordCount":439,"commentCount":0,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Apple-iOS-14_-3-Awesome-New-iPhone-Security-Features-Youll-Want-Now-\u2014-Forbes.jpeg","keywords":["Apple","Apple Security","Iphone","SocialProof","Threat","Tips and Tricks"],"articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/","url":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/","name":"Hackers Exploit Apple Security Flaw, Take Complete Control of Devices! | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Apple-iOS-14_-3-Awesome-New-iPhone-Security-Features-Youll-Want-Now-\u2014-Forbes.jpeg","datePublished":"2023-11-29T17:22:03+00:00","dateModified":"2023-12-03T18:02:41+00:00","description":"Apple Security - Actively Exploited - Apple enthusiasts, we've got some crucial news: there's a pressing need to update your iPhones, iPads, and Macs","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Apple-iOS-14_-3-Awesome-New-iPhone-Security-Features-Youll-Want-Now-\u2014-Forbes.jpeg","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/11\/Apple-iOS-14_-3-Awesome-New-iPhone-Security-Features-Youll-Want-Now-\u2014-Forbes.jpeg","width":735,"height":490,"caption":"Apple Security Flaw Actively Exploited by Hacker to Takeover Devices"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/hackers-actively-exploit-apple-security-flaw-take-complete-control-of-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"Hackers Exploit Apple Security Flaw, Take Complete Control of Devices!"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/acc5b116f6d4870e1ecd6928630104f5","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=4337"}],"version-history":[{"count":17,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4337\/revisions"}],"predecessor-version":[{"id":4401,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/4337\/revisions\/4401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/4355"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=4337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=4337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=4337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}