Live
- UpStudy: The Smart Solution for Homework Hassles
- Actress Rithika and models inaugurate Sutraa Lifestyle Exhibition
- Loud campaign
- Faculty students celebrated english literature day in Government Degree College
- Huge fire accident.. Shops of street vendors burnt in the fire
- Pawan Kalyan promises to protect the coastal area from sea erosion
- EC Transfers Two Senior IPS Officers in AP ahead of Elections
- DMK analysis predicts victory for INDIA bloc in TN but concedes gains for BJP and NDA too
- India showcasing innovative technologies at World Energy Congress
- IPL 2024: Mitchell comes in for Ravindra as Lucknow opt to bowl first against Chennai
Just In
Recently Apple faced a lot of criticism due to one of the biggest bugs noticed in iOS The bug, spotted in Group FaceTime video calling, allowed callers to eavesdrop others without them answering the call Even though that has been fixed with the recent iOS 1214 version, a new one has been discovered that also has Instagrams involvement in it
Recently Apple faced a lot of criticism due to one of the biggest bugs noticed in iOS. The bug, spotted in Group FaceTime video calling, allowed callers to eavesdrop others without them answering the call. Even though that has been fixed with the recent iOS 12.1.4 version, a new one has been discovered that also has Instagram’s involvement in it.
The flaw came as a part of Exposure, a third-party utility app that was being used by Apple for the ‘Shot on iPhone’ campaign. The Exposure app helps brands to connect with Instagram users and getting the license to use their images for marketing, in this case, the one that is ‘Shot on iPhone’ campaign.
Once an image is selected for marketing by Apple, to speed up the licensing process, it uses Exposure. Exposure then sends a form to fill to the Instagram user, asking for his/her contact details and other copyright details for the photograph. However, the flaw has made these personal details accessible by anyone.
In a proposal to secure developer accounts from the hackers, Apple has added the obligation of two-factor authentication (2FA) protocol for all app makers to protect their Apple IDs.
What's at stake?
According to the report, this flaw gave out the email IDs of iOS users who shot images using an iPhone device and filled out the forms using Exposure, which was used by Apple. In addition, the flaw also gave some metadata details on the image.
Even though this looks like a minor threat, it still is leaking out iOS users’ personal details openly. It won’t continue anymore as Apple has stopped using Exposure after being alerted about this flaw.
Exposure accepts the flaw
Ingnite, the parent company of Exposure also gave a statement. “At 10:29 a.m. ET on February 13, 2019, Chute became aware that individuals who made it through the full submission and rights approval process may have had information potentially exposed to others.
This potential issue was limited to a small fraction of all such users who have posted their images to Apple for consideration. After immediately investigating the issue, Chute shut down the relevant part of the application at 11:32 a.m. ET on February 13, 2019, containing the issue.
The problem identified was in the Chute solution and is not part of any of Apple’s software or systems,” said the firm in a statement. The firm claims no user data has been compromised until now.
© 2024 Hyderabad Media House Limited/The Hans India. All rights reserved. Powered by hocalwire.com