Scary email vulnerability in iOS 16!

Introduced in the past weeks, iOS 16 came up with a new problem. A vulnerability has been discovered that will make the email application in the iOS 16 version unusable by malicious people. The email vulnerability, called MailJack, affects all devices running iOS 16.

In the past years, it has become clear that the iOS operating system has entered an endless loop with the special characters sent via iMessage. Also known as the Telugu bug, this issue has caused thousands of iPhone users to reset their device.

iOS 16 is on the agenda with an email vulnerability called MailJack

Equinux discovered a bug while analyzing spam emails in the iOS 16 operating system. Making a statement on the subject, the team said, “The e-mail application has stopped error appeared in more than one person in our team. As a result of our investigations, we determined that the same email was sent to everyone on the team.” made statements.

Stating that the message did not have a code that would pose any problem, the company explained that the attackers used special characters in the sender part. [email protected] It has been determined that the e-mail address that should be created with special characters puts the application in an infinite loop.

Camera flickering problem solved!  iOS 16.0.2 update released

Camera flickering problem solved! iOS 16.0.2 update released

Apple has released iOS 16.0.2 update that fixes camera shake and copy/paste issues.

This vulnerability, which affects all devices with iOS 16 version installed, is called Mailjack. Equinux highlighted that the bug affects the Mail app in iOS 16, iOS 16.0.1 and iOS 16.1 and iPadOS 16.1 betas.

It was announced that the vulnerability does not affect people who use other e-mail services such as Gmail, Outlook and Hotmail. Users who encounter a similar error, log in to their accounts from the computer and delete the relevant e-mail, which eliminates the problem.

What do you think about this subject? You can express your ideas in the comments section and on the SDN Forum.

source site-29