CORRECTION NOTICE: An earlier post (dated 12 Dec 2024, that has since been deleted) communicated false statements of fact.

For the correct facts, Visit

Apple launched its latest iOS update 12.1.3 on Tuesday, January 22, and iPhone, iPad, and HomePod users have been enabled to fix bugs on different apps. Included among these ‘bugs’ is one that apparently let hackers control FaceTime calls.

Don’t panic. Just update your phone as soon as you’ve done reading this.

Usually, most of us skip the fine print when we update software on our devices, thinking it’s no big deal, just a necessary thing we have to do to keep our phones fast and updated.

But the information on the security content of iOS 12.1.3 is alarming indeed, especially in this day and age when we want to keep our information safe, and a hack could cost a lot of damage to us, to our wallets and even emotionally.

iPhones and other Apple gadgets have an app called FaceTIme, used for video calling. Unbeknownst to the millions of Apple users all over the globe, a bug in the app made it vulnerable to hackers, who could make calls from the app remotely. Fortunately, according to Apple’s tech support page, this problem has been addressed.

See also  Customer buys faulty AirPods from Shopee Mall Apple store, faces “horrendous customer service” and “emotional turmoil” trying to return it

Under the FaceTime section, it says,

“FaceTime
Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
Impact: A remote attacker may be able to initiate a FaceTime call causing arbitrary code execution
Description: A buffer overflow issue was addressed with improved memory handling.”

According to UK’s DailyMail, hackers could have used the bug to insert malicious code through FaceTime, and now they can no longer do so.

Apparently, Apple had been told by the U.S. National Cybersecurity and Communications Integration Center that their devices needed updating in order to avoid ‘vulnerabilities in multiple products.’

A similar explanation can be found in the section under Bluetooth, which also received an update.

“Bluetooth
Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
Impact: An attacker in a privileged network position may be able to execute arbitrary code
Description: An out-of-bounds read was addressed with improved input validation.”

See also  Is Samsung following in Apple’s steps? Leak of Galaxy Tab S6 shows a curious, but now-familiar, feature

There were also ‘malicious application’ bugs fixed in CoreAnimation, iOKit, Kernel, and libxpc. Bugs concerning ‘maliciously crafted web content’ that could lead to “arbitrary code execution” were also addressed for other applications.

Read also: If China boycotts Apple, will Singapore follow suit?

https://theindependent.sg.sg/china-boycotts-apple-will-singapore-follow-suit/