Android

iCloud and other Apple services are vulnerable

The Log4Shell vulnerability allows hackers to invade computer servers from Apple, among others, and run malicious software. Apple’s iCloud is also vulnerable to this problem, but what can you do about it yourself?

Read on after the ad.

Log4Shell security vulnerability: also on Apple iCloud

The vulnerability was discovered in a tool used to keep program logs called log4j. The software is used, among other things, to detect errors in programs. The program is used by many companies and is therefore quite widespread.

Companies such as Apple have been urged to update the tool as soon as possible. This also closes the vulnerability. The NCSC (National Cyber ​​Security Center) has released a list of the software in which the vulnerability is present (as far as is known).

The exploit even surfaced in the popular Minecraft game recently. Here, hackers managed to run malicious software through simple in-game chat messages. It is even possible for malicious parties to execute malicious software via a QR code. That makes the vulnerability even more dangerous.

Minecraft on iPhone

What can you do against Log4Shell yourself?

In short, there’s not much you can do about it yourself. The problem with Log4Shell has to be solved at the companies, such as Apple. However, it is wise to always install updates and new versions of apps and iOS as soon as possible. So regularly check whether there are updates for your iPhone or iPad and install them.

You can read how to update the iPhone in the article: how to install the latest iOS version. Want to know if there are updates for your favorite apps? Then open the App Store, tap your profile picture at the top right and drag the window down. Then tap Update All.

App Store Update Apps

Want to stay up to date with all the Apple news? Then keep an eye on this website, download the iPhoned app and sign up for the free newsletter. Also follow us on Facebook and Instagram.

Leave a Reply

Your email address will not be published. Required fields are marked *