Latest Videos

{{ currentStream.Name }}

Related Video

Continuous Play:
ON OFF

The information you requested is not available at this time, please check back again soon.

More Video

Apr 23, 2020

Apple finds no evidence hackers exploited iPhone, iPad mail flaw

Apple, Google contact-tracing tech raises data concerns: Former Ont. privacy commissioner

VIDEO SIGN OUT

Security Not Found

The stock symbol {{StockChart.Ric}} does not exist

See Full Stock Page »

Apple Inc. said it found no evidence of cyber-attackers exploiting newly discovered vulnerabilities in the Mail app for iPhone and iPad, software used by hundreds of millions of people worldwide.

The U.S. company is countering assertions by cybersecurity company ZecOps Inc. that software flaws may have allowed hackers to infiltrate iPhones and other iOS devices for more than a year. Apple launched an investigation and said in a statement the mail issues were insufficient by themselves to allow cyber-attackers to bypass built-in security, adding it will issue a fix soon.

“We have thoroughly investigated the researcher’s report and, based on the information provided, have concluded these issues do not pose an immediate risk to our users,” the Cupertino, California company said. “The researcher identified three issues in Mail, but alone they are insufficient to bypass iPhone and iPad security protections, and we have found no evidence they were used against customers.”

San Francisco-based ZecOps said Wednesday the vulnerability can be exploited when a specially crafted email is opened on the app by an iPhone or an iPad. The flaws may have been used in attacks conducted by “an advanced threat operator,” it said in a report. Among the victims were “individuals from a Fortune 500 organization in North America” and “an executive from a carrier in Japan,” as well as “a journalist in Europe,” ZecOps said.

The vulnerabilities may have been exploited by attackers since January 2018, according to ZecOps. The bugs were disclosed publicly when Apple issued a beta update, and attackers “will likely use the time until a patch is available to attack as many devices as possible,” ZecOps predicted.