{"id":1771,"date":"2021-10-07T23:02:00","date_gmt":"2021-10-08T06:02:00","guid":{"rendered":"https:\/\/www.karlstechnology.com\/blog\/?p=1771"},"modified":"2021-10-08T12:35:45","modified_gmt":"2021-10-08T19:35:45","slug":"apple-imessage-breach-last-month","status":"publish","type":"post","link":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/","title":{"rendered":"Apple iMessage Breach Last Month"},"content":{"rendered":"\n<p>Internet trolls can breach any type of system if it is not properly secured. Emails and software are just two ways they can infiltrate your pc without your awareness. <\/p>\n\n\n\n<p>The motivations for these attacks range from stealing data to financial gain. They also crash business computers in order to shut them down. One breach, in particular, occurred last month against the software giant, Apple.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Apple&#8217;s iMessage Security Breach<\/h4>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Apple has put out a new security update to fix a flaw that caused a software breach for months, The Wall Street Journal (WSJ) reported Monday (Sept. 13).<\/p><p>NSO Group, an Israeli cybersecurity firm, has been exploiting a vulnerability to silently infect iPhones using iMessage since February, WSJ reported, citing research group Citizen Lab, which looks into cyberattacks on \u201cjournalists and dissidents.\u201d<\/p><p>The intrusion was ominous to Citizen Lab because it was a \u201czero click\u201d attack, referring to an attack in which the user doesn\u2019t need to click a link or open a document to be attacked, according to the report.<\/p><p>John Scott-Railton, one of the Citizen Lab researchers, told WSJ that \u201canyone with iMessage\u201d could be infected unknowingly. He added that the software was \u201crare and probably expensive,\u201d and that it likely was developed with a substantial amount of work.<\/p><cite>Source: <a href=\"https:\/\/www.pymnts.com\/news\/security-and-risk\/2021\/apple-fixes-flaw-causing-software-breach-since-february\/\">Pymnts.com<\/a><\/cite><\/blockquote>\n\n\n\n<h4 class=\"wp-block-heading\">What can you do?<\/h4>\n\n\n\n<p>You can take steps to improve your cyber-defenses, such as making sure your important files and data are backed up to secure cloud storage. We recommend&nbsp;<a class=\"\" href=\"http:\/\/partners.carbonite.com\/karlstechnology\">Carbonite online backup solutions<\/a>&nbsp;which will safeguard your data against any type of attack or dilemma.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<p><br>If you are needing assistance with any malware issues, please give us a call at&nbsp;<a href=\"tel:1-800-620-5285\">1-800-620-5285<\/a>. &nbsp;Karls Technology is a nationwide computer service company with offices in many&nbsp;major cities. &nbsp;This blog post is brought by our staff at&nbsp;<strong><a href=\"https:\/\/www.arlingtoncomputerrepairservice.com\/\">Arlington Computer Repair Service<\/a><\/strong>. If you need&nbsp;<a href=\"https:\/\/www.arlingtoncomputerrepairservice.com\/\">computer repair in Arlington, TX<\/a>&nbsp;please call the local office at&nbsp;<a href=\"tel:817-756-6008\">(817) 756-6008<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internet trolls can breach any type of system if it is not properly secured. Emails and software are just two ways they can infiltrate your pc without your awareness. The motivations for these attacks range from stealing data to financial gain. They also crash business computers in order to shut them down. One breach, in [&hellip;]<\/p>\n","protected":false},"author":22392,"featured_media":1777,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[4,69],"class_list":["post-1771","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computerrepair","tag-apple","tag-hackers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apple iMessage Breach Last Month - Computer Repair Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple iMessage Breach Last Month - Computer Repair Blog\" \/>\n<meta property=\"og:description\" content=\"Internet trolls can breach any type of system if it is not properly secured. Emails and software are just two ways they can infiltrate your pc without your awareness. The motivations for these attacks range from stealing data to financial gain. They also crash business computers in order to shut them down. One breach, in [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Repair Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/karlstechnology\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-08T06:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-08T19:35:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Message_Crash_Graphic.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1531\" \/>\n\t<meta property=\"og:image:height\" content=\"567\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristin Willis\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristin Willis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/\"},\"author\":{\"name\":\"Kristin Willis\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d\"},\"headline\":\"Apple iMessage Breach Last Month\",\"datePublished\":\"2021-10-08T06:02:00+00:00\",\"dateModified\":\"2021-10-08T19:35:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/\"},\"wordCount\":334,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Message_Crash_Graphic.png\",\"keywords\":[\"Apple\",\"hackers\"],\"articleSection\":[\"Computer Repair\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/\",\"name\":\"Apple iMessage Breach Last Month - Computer Repair Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Message_Crash_Graphic.png\",\"datePublished\":\"2021-10-08T06:02:00+00:00\",\"dateModified\":\"2021-10-08T19:35:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#primaryimage\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Message_Crash_Graphic.png\",\"contentUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Message_Crash_Graphic.png\",\"width\":1531,\"height\":567},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.karlstechnology.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple iMessage Breach Last Month\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#website\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/\",\"name\":\"Computer Repair Blog\",\"description\":\"Karls Technology Computer Repair\",\"publisher\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.karlstechnology.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#organization\",\"name\":\"Karls Technology\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png\",\"contentUrl\":\"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png\",\"width\":800,\"height\":99,\"caption\":\"Karls Technology\"},\"image\":{\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/karlstechnology\",\"https:\/\/x.com\/karlstechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d\",\"name\":\"Kristin Willis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g\",\"caption\":\"Kristin Willis\"},\"sameAs\":[\"https:\/\/www.karlstechnology.com\"],\"url\":\"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple iMessage Breach Last Month - Computer Repair Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/","og_locale":"en_US","og_type":"article","og_title":"Apple iMessage Breach Last Month - Computer Repair Blog","og_description":"Internet trolls can breach any type of system if it is not properly secured. Emails and software are just two ways they can infiltrate your pc without your awareness. The motivations for these attacks range from stealing data to financial gain. They also crash business computers in order to shut them down. One breach, in [&hellip;]","og_url":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/","og_site_name":"Computer Repair Blog","article_publisher":"https:\/\/www.facebook.com\/karlstechnology","article_published_time":"2021-10-08T06:02:00+00:00","article_modified_time":"2021-10-08T19:35:45+00:00","og_image":[{"width":1531,"height":567,"url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Message_Crash_Graphic.png","type":"image\/png"}],"author":"Kristin Willis","twitter_misc":{"Written by":"Kristin Willis","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#article","isPartOf":{"@id":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/"},"author":{"name":"Kristin Willis","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d"},"headline":"Apple iMessage Breach Last Month","datePublished":"2021-10-08T06:02:00+00:00","dateModified":"2021-10-08T19:35:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/"},"wordCount":334,"commentCount":0,"publisher":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#primaryimage"},"thumbnailUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Message_Crash_Graphic.png","keywords":["Apple","hackers"],"articleSection":["Computer Repair"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/","url":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/","name":"Apple iMessage Breach Last Month - Computer Repair Blog","isPartOf":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#primaryimage"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#primaryimage"},"thumbnailUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Message_Crash_Graphic.png","datePublished":"2021-10-08T06:02:00+00:00","dateModified":"2021-10-08T19:35:45+00:00","breadcrumb":{"@id":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#primaryimage","url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Message_Crash_Graphic.png","contentUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2021\/10\/Message_Crash_Graphic.png","width":1531,"height":567},{"@type":"BreadcrumbList","@id":"https:\/\/www.karlstechnology.com\/blog\/apple-imessage-breach-last-month\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.karlstechnology.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Apple iMessage Breach Last Month"}]},{"@type":"WebSite","@id":"https:\/\/www.karlstechnology.com\/blog\/#website","url":"https:\/\/www.karlstechnology.com\/blog\/","name":"Computer Repair Blog","description":"Karls Technology Computer Repair","publisher":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.karlstechnology.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.karlstechnology.com\/blog\/#organization","name":"Karls Technology","url":"https:\/\/www.karlstechnology.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png","contentUrl":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/04\/karlstechnology.png","width":800,"height":99,"caption":"Karls Technology"},"image":{"@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/karlstechnology","https:\/\/x.com\/karlstechnology"]},{"@type":"Person","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/bc979de85e31552def2c5917dfc51b2d","name":"Kristin Willis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.karlstechnology.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9274e0fd36a71af1da9f3c53500479b6?s=96&d=mm&r=g","caption":"Kristin Willis"},"sameAs":["https:\/\/www.karlstechnology.com"],"url":"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1771"}],"collection":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/users\/22392"}],"replies":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/comments?post=1771"}],"version-history":[{"count":4,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1771\/revisions"}],"predecessor-version":[{"id":1779,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1771\/revisions\/1779"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/media\/1777"}],"wp:attachment":[{"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/media?parent=1771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/categories?post=1771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.karlstechnology.com\/blog\/wp-json\/wp\/v2\/tags?post=1771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}