iOS 14.5's PAC Security Tool Prevents Malicious Codes; Does It Mean No More Zero-Click Hacking? – Tech Times

iOS 14.5 was previously released on Feb. 1. But, its final version is not yet available for iPhone users. iOS 14.5’s complete version is expected to arrive sometime this February. 

Apple’s latest iPhone system is packed with advanced features that will enhance users’ smartphone experience. On the other hand, iOS 14.5 is also expected to bring a new security tool that will completely prevent zero-click hacking. 

iOS 14.5 Might Bring the Most Effective Security Tool: Here's How PAC Prevents Zero-Click Hacking

(Photo : Photo by Justin Sullivan/Getty Images)
The new iPhone 5S with fingerprint technology is displayed during an Apple product announcement at the Apple campus on September 10, 2013 in Cupertino, California. The company launched the new iPhone 5C model that will run iOS 7 is made from hard-coated polycarbonate and comes in various colors and the iPhone 5S that features fingerprint recognition security.

Also Read: Samsung Security Update is Now Extended Up to Four Years Original Purchase Date! Is Your Phone Qualified?

According to Apple Insider‘s latest report, the tech giant company has added the Pointer Authentication Codes (PAC) security feature into its latest iOS 14.5. This new tool is specifically designed to protect users from exploits that deliver malicious code through memory corruption. 

How iOS 14.5’s PAC security tool works 

Thanks to Apple’s latest PAC security feature, iOS 14.5 can now authenticate and validate what the company calls ISA pointers. To give your more idea, ISA is a feature that tells an iOS program what code to run. PAC will further check the ISA pointers before they are used in iPhones to prevent zero-click hacking. 

iOS 14.5 Might Bring the Most Effective Security Tool: Here's How PAC Prevents Zero-Click Hacking

(Photo : Photo by Sean Gallup/Getty Images)
A customer tries out the new Apple iPhone 5C smartphone at the Berlin Apple Store on the first day of sales on September 20, 2013 in Berlin, Germany. The new iPhone 5S and 5C phones went on sale all over the world today and hundreds of customers waited outside the Berlin store in the rain to be among the first to buy the new phones starting at 8am.

Security researchers explained that PAC will prevent hackers from conducting zero-click attacks, which refers to exploits that allow malicious actors to compromise an iPhone without any interaction from the user. Zero-click attacks were previously rampant before Apple started to release more effective security features. 

On the other hand, iOS 14.5’s PAC is also expected to prevent sandbox escapes, which are online attacks that attempt to breach the built-in isolation security systems in iOS. PAC’s efficiency was confirmed by an Apple spokesperson, claiming that it will now make zero-click exploits harder to pull off. 

However, Apple said that it still can’t completely block zero-click attacks, but it has raised iPhone’s security protection. Hackers will soon find it harder to conduct this malicious activity, forcing them to spend more money on different hacking tools.  

How to get this security feature? 

If you want to try Apple’s new PAC security tool, all you need to do is install the latest iOS 14.5 version. CNET explained that you can do this by going to your device’s Settings App. 

After that, you need to click the “General” option and choose Software Update. Once you are done with the process, your iPhone will connect to Apple’s servers and prompt you to install the update. 

When the instruction appears, all you need to do is follow it until the last step. 

For more news updates about iOS 14.5 and other Apple products or services, always keep your tabs open here at TechTimes.  

Related Article: Apple Unveils Security Features That Will Want You to Choose iOS or MacOS Over Google

This article is owned by TechTimes.

Written by: Giuliano de Leon.

ⓒ 2018 All rights reserved. Do not reproduce without permission.


Leave a Reply

This website uses cookies. By continuing to use this site, you accept our use of cookies.