Apple had been under the bug scanner for quite a while, thanks to security loopholes in Apple Pay and Safari. Now, taking a cue from all that, the company has fixed more than 100 such issues by sending out a security update on iOS 9.
To start with, there were 30 flaws that were found in the WebKit, a browser engine that is employed by Safari. It meant that this loophole could have allowed shady websites to display virus filled content by using a URL from a different website. Not only this, a rather malicious security breach was detected in Apple Pay as well that could have easily given a window to hackers to access Apple Pay transactions.
This doesn’t stop here, another bug was recently reported, which could have allowed hackers to access player’s e-mail via Game Centre application on the device. Another flaw that was made straight was the one that could have made it achievable for hackers to send a fishy e-mail to a user by displaying a name from the iPhone user’s contact list.
But thanks to this latest security update, all these bugs have been fixed by Apple. One can get a deeper insight into the aforementioned issues by going to Apple support website. The listing on Apple’s website also mentions the main issue and how Apple attained success in fixing it through this security update.
Recent reports also pointed out that Apple (through its iOS 9 update) had reportedly been disabling the iPhones that have been fixed by a third-party. Moreover, there was also an "Error 53" issue that apparently affected those iPhone 6s units that have undergone third-party repair on the home button or the Touch ID. The Error caused such units to black out and lose data. The issue sparked a distress among many users, while Apple is defending its action by calling it mandatory for security reasons. However, the affected users that have got their handsets repaired via authorised stores, are planning to drag the company to the court over the Error 53 issue.
Do these popping bugs make you lose a little faith in Apple’s security level? Let us know through the comments section.