{"id":7347,"date":"2014-02-27T11:51:06","date_gmt":"2014-02-27T16:51:06","guid":{"rendered":"http:\/\/www.opensource.im\/?p=7347"},"modified":"2014-02-27T11:51:06","modified_gmt":"2014-02-27T16:51:06","slug":"was-your-iphone-at-risk-of-being-hacked-bug-in-apple-update-left-mobiles-open-to-identity-theft-for-up-to-18-months","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/was-your-iphone-at-risk-of-being-hacked-bug-in-apple-update-left-mobiles-open-to-identity-theft-for-up-to-18-months.php","title":{"rendered":"Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months &#8230;"},"content":{"rendered":"<p><p>Experts have advised iPhone users to download iOS      7.0.6 as quickly as possible, which was rolled out by Apple      on Friday              Is thought users of iOS devices could have been at      risk to the vulnerability for up to a year-and-a-half but      there have been no reports of hacks              Johns Hopkins cryptography professor in Baltimore,      Maryland said that the bug was 'as bad as you can      imagine'        <\/p>\n<p>    By Sarah Griffiths  <\/p>\n<p>    PUBLISHED:    09:48 EST, 24 February 2014 | UPDATED: 09:48 EST, 24    February 2014  <\/p>\n<p>      557 shares    <\/p>\n<p>      53    <\/p>\n<p>      View      comments    <\/p>\n<p>      iPhone users have been blissfully unaware that for the past      year-and-a half they could have been the victim of 'hi-tech      eavesdropping'    <\/p>\n<p>    iPhone users have been blissfully unaware that for    approximately a year-and-a half a software bug could have made    them the victims of hi-tech eavesdropping.<\/p>\n<p>    Security experts have warned that past iterations of iOS    software - dating from as long ago as September 2012 - had a    vulnerability that hackers could have exploited to see    financial transactions, emails and Facebook    activity.<\/p>\n<p>    They have advised iPhone users to download iOS 7.0.6 as    quickly as possible, which was rolled out by Apple on Friday    with a note about the patch.<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.dailymail.co.uk\/sciencetech\/article-2566675\/Was-YOUR-iPhone-risk-hacked-Bug-Apple-update-left-mobiles-open-identity-theft-18-months-experts-claim.html?ITO=bookmark-chromeext&ns_mchannel=rss&ns_campaign=bookmark-chromeext\/RK=0\/RS=bDB82OJqL6MMCjKO2ytHc2ewMBM-\" title=\"Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ...\">Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Experts have advised iPhone users to download iOS 7.0.6 as quickly as possible, which was rolled out by Apple on Friday Is thought users of iOS devices could have been at risk to the vulnerability for up to a year-and-a-half but there have been no reports of hacks Johns Hopkins cryptography professor in Baltimore, Maryland said that the bug was 'as bad as you can imagine' By Sarah Griffiths PUBLISHED: 09:48 EST, 24 February 2014 | UPDATED: 09:48 EST, 24 February 2014 557 shares 53 View comments iPhone users have been blissfully unaware that for the past year-and-a half they could have been the victim of 'hi-tech eavesdropping' iPhone users have been blissfully unaware that for approximately a year-and-a half a software bug could have made them the victims of hi-tech eavesdropping. Security experts have warned that past iterations of iOS software - dating from as long ago as September 2012 - had a vulnerability that hackers could have exploited to see financial transactions, emails and Facebook activity. They have advised iPhone users to download iOS 7.0.6 as quickly as possible, which was rolled out by Apple on Friday with a note about the patch<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-7347","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/7347"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=7347"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/7347\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=7347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=7347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=7347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}