HT207107: About the security content of iOS 9.3.5
Learn about About the security content of iOS 9.3.5
-
All replies
-
Helpful answers
-
Aug 26, 2016 8:41 AM in response to RMENDOZby razmee209,RMENDOZ wrote:
How do I know if phone already has the malware? Will the upgrade remove that malware ?
There are no known malware for a non jailbroken phone.
Upgrading IOS doesn't remove anything just updates your IOS.
Can you explain why you think your phone has malware?
-
Aug 26, 2016 8:45 AM in response to RMENDOZby samuellk,Hi RMENDOZ!!!
Welcome to Apple Communities!
IPhones Cannot get Malware, Spyware or any kind of virus. That Is be cause viruses cannot spread because the apps on your phone cannot talk to each other,/ Spread any sort of virus without the users permission.
I Hope this answers your question
-
Aug 26, 2016 8:55 AM in response to RMENDOZby Demo,This software that was discovered was not a malware attack. For lack of a better term, it is software that can spy on people through a hole in the iOS security which Apple patched with this upgrade.
http://www.nytimes.com/2016/08/26/technology/apple-software-vulnerability-ios-pa tch.html?_r=0
-
Aug 26, 2016 8:57 AM in response to razmee209by SergZak,Probably in reference to the recently released iOS 9.3.5 the OP linked to in his original post:
-
Aug 26, 2016 9:00 AM in response to SergZakby razmee209,SergZak wrote:
Probably in reference to the recently released iOS 9.3.5 the OP linked to in his original post:
Good eye.
-
Aug 27, 2016 10:35 AM in response to Demoby lizhiguoyuan,Don't these loopholes allow arbitrary code execution? With kernel privileges? Wouldn't they then be able to infiltrate the system with code that runs in the background, etc?
-
Aug 27, 2016 10:40 AM in response to lizhiguoyuanby Michael Black,The actual reported zero day exploits involved users responding to a URL in a phishing text message or notification message. So unless you're prone to clicking on links in messages from unknown senders or obscure unsolicited texts, you are fine. They cannot magically execute remotely on the device without some initial user intervention.
However, once someone were to click on the URL, the rest of the exploit could then potentially run in total stealth.
Some info - https://blog.lookout.com/blog/2016/08/25/trident-pegasus/