{"id":671625,"date":"2026-01-15T20:06:03","date_gmt":"2026-01-15T20:06:03","guid":{"rendered":"https:\/\/microscopemedia.com\/?p=671625"},"modified":"2026-01-15T20:06:03","modified_gmt":"2026-01-15T20:06:03","slug":"sute-de-milioane-de-iphone-uri-in-pericol-apple-avertizeaza-despre-atacuri-spyware-sofisticate","status":"publish","type":"post","link":"https:\/\/microscopemedia.com\/?p=671625","title":{"rendered":"Sute de milioane de iPhone-uri, \u00een pericol: Apple avertizeaz\u0103 despre atacuri spyware sofisticate"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/microscopemedia.com\/wp-content\/uploads\/2026\/01\/sute-de-milioane-de-iphone-uri-in-pericol-apple-avertizeaza-despre-atacuri-spyware-sofisticate.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-0\">Aceste atacuri sunt extrem de sofisticate \u0219i precise. Adesea folosesc exploat\u0103ri zero-click care permit hackerilor s\u0103 preia controlul asupra unui dispozitiv. Utilizatorul nu trebuie s\u0103 fac\u0103 clic pe un link, s\u0103 deschid\u0103 un fi\u0219ier sau s\u0103 fac\u0103 orice altceva, a explicat compania, citat\u0103 de <a href=\"https:\/\/www.dailymail.co.uk\/sciencetech\/article-15467607\/Apple-iPhones-attack-hacks.html?ns_mchannel=rss&amp;ns_campaign=1490&amp;ito=1490\" target=\"_blank\" rel=\"noopener\">Daily Mail<\/a>.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-1\">Dac\u0103 un dispozitiv este infectat, hackerii ar putea fura date personale, urm\u0103ri loca\u021bia utilizatorului, accesa camerele \u0219i microfoanele sau chiar comite fraude financiare. Sunt puse \u00een pericol at\u00e2t confiden\u021bialitatea, c\u00e2t \u0219i securitatea.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-2\">Exper\u021bii \u00een securitate cibernetic\u0103 \u00eei \u00eendeamn\u0103 pe utilizatori s\u0103 \u201eac\u021bioneze acum\u201d prin repornirea dispozitivelor. Apoi trebuie s\u0103 acceseze Set\u0103ri, General \u0219i s\u0103 selecteze Actualizare software.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-3\">\u201eCeea ce mul\u021bi oameni nu realizeaz\u0103 este c\u0103, atunci c\u00e2nd reporni\u021bi dispozitivul, orice malware rezident \u00een memorie este eliminat, cu excep\u021bia cazului \u00een care a c\u00e2\u0219tigat cumva persisten\u021b\u0103, caz \u00een care va reveni\u201d, au spus cercet\u0103torii \u00een securitate cibernetic\u0103 de la Malwarebytes.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-4\">\u201eInstrumentele spyware de ultim\u0103 genera\u021bie tind s\u0103 evite s\u0103 lase urme necesare pentru persisten\u021b\u0103. Se bazeaz\u0103 adesea pe faptul c\u0103 utilizatorii nu \u00ee\u0219i reporne\u0219te dispozitivele.\u201d<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\" id=\"chapter-0\">Peste jum\u0103tate dintre utilizatori nu au instalat iOS 26<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-5\">Apple a lansat iOS 26 pentru public pe 15 septembrie 2025. \u00cen ianuarie 2026, marea majoritate a utilizatorilor de iPhone, p\u00e2n\u0103 la 75%, nu a desc\u0103rcat iOS 26. Rata de adoptare se situeaz\u0103 \u00eentre aproximativ 16% \u0219i 20%, semnificativ mai mic\u0103 dec\u00e2t \u00een cazul versiunilor anterioare de iOS.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-6\">Exper\u021bii din industrie au speculat c\u0103 lipsa desc\u0103rc\u0103rilor provine din ezitarea utilizatorilor fa\u021b\u0103 de noul \u201eLiquid Glass\u201d. Este un nou limbaj de design vizual introdus odat\u0103 cu iOS 26 \u00een 2025, cu interfe\u021be translucide, refractive \u0219i cu reac\u021bie dinamic\u0103, care creeaz\u0103 profunzime \u0219i focalizare.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-7\">Cei care au adoptat noul design l-au g\u0103sit confuz \u0219i distractiv din punct de vedere vizual. Acest lucru a dus la critici.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\" id=\"chapter-1\">iOS 26 aduce m\u0103suri de securitate \u00eembun\u0103t\u0103\u021bite<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-8\">Majoritatea iPhone-urilor func\u021bioneaz\u0103 cu iOS 18 datorit\u0103 suportului de securitate extins ad\u0103ugat de Apple. Cu toate acestea, cea mai recent\u0103 actualizare iOS 26 \u00eent\u0103re\u0219te securitatea cu noi m\u0103suri de protec\u021bie \u00eempotriva urm\u0103ririi online \u00een Safari. Blocheaz\u0103 conexiunile cu fir riscante \u0219i adaug\u0103 instrumente pentru a proteja utilizatorii de apeluri \u0219i mesaje frauduloase.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-9\">Apple a lansat o nou\u0103 versiune a iOS 26 luna trecut\u0103, dup\u0103 ce a identificat dou\u0103 defecte critice. Vulnerabilit\u0103\u021bile au fost g\u0103site \u00een WebKit, motorul browserului care alimenteaz\u0103 Safari \u0219i toate browserele de pe iOS. Compania le-a descris ca parte a unui \u201eatac extrem de sofisticat\u201d care vizeaz\u0103 anumite persoane.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\" id=\"chapter-2\">Site-uri web r\u0103u inten\u021bionate pot prelua controlul iPhone-ului<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-10\">Riscul provine de la site-uri web r\u0103u inten\u021bionate, care ar putea p\u0103c\u0103li dispozitivul s\u0103 execute instruc\u021biuni d\u0103un\u0103toare. Asta \u00eenseamn\u0103 c\u0103 hackerii ar putea prelua controlul asupra iPhone-ului sau iPad-ului sau ar putea rula cod f\u0103r\u0103 permisiunea utilizatorului.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-11\">Pentru utilizatorii care au activat\u0103 op\u021biunea de actualizare automat\u0103, patch-ul ar trebui s\u0103 fie deja instalat. Ceilal\u021bi vor trebui s\u0103 descarce manual iOS 26.2 sau iPadOS 26.2 din set\u0103rile dispozitivului.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\" id=\"chapter-3\">Care sunt dispozitivele expuse riscului<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-12\">Dispozitivele cele mai expuse riscului includ iPhone 11 \u0219i versiunile ulterioare, iPad Pro 12,9 inci (a treia genera\u021bie \u0219i versiunile ulterioare) \u0219i iPad Pro 11 inci (prima genera\u021bie \u0219i versiunile ulterioare).<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-13\">Alte modele vulnerabile includ iPad Air (a treia genera\u021bie \u0219i versiunile ulterioare), iPad (a opta genera\u021bie \u0219i versiunile ulterioare) \u0219i iPad mini (a cincea genera\u021bie \u0219i versiunile ulterioare).<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-14\">Deficien\u021bele sunt clasificate ca vulnerabilit\u0103\u021bi zero-day. Aceasta \u00eenseamn\u0103 c\u0103 erau necunoscute creatorilor de software \u0219i puteau fi exploatate de hackeri \u00eenainte de apari\u021bia unui patch.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-15\">Echipele de securitate, inclusiv grupul de analiz\u0103 a amenin\u021b\u0103rilor Apple \u0219i Google, au descoperit punctele slabe. Au avertizat c\u0103 bug-urile ar putea permite atacuri cibernetice poten\u021bial devastatoare.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-16\">Apple a lansat, de asemenea, actualiz\u0103ri pentru iOS 18.7.3 \u0219i iPadOS 18.7.3, macOS Tahoe 26.2, tvOS 26.2, watchOS 26.2, visionOS 26.2 \u0219i Safari 26.2.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-17\">Una dintre probleme, numit\u0103 bug \u201euse-after-free\u201d, este o problem\u0103 de memorie pe care Apple a rezolvat-o \u00eembun\u0103t\u0103\u021bind modul \u00een care dispozitivul gestioneaz\u0103 datele temporare. Apple a etichetat defectul ca CVE-2025-43529.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\" id=\"p-18\">O alt\u0103 problem\u0103, cunoscut\u0103 sub numele de bug de corup\u021bie a memoriei, a fost remediat\u0103 prin ad\u0103ugarea unor verific\u0103ri mai stricte pentru a preveni erorile. Aceasta a fost etichetat\u0103 ca CVE-2025-14174.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aceste atacuri sunt extrem de sofisticate \u0219i precise. Adesea folosesc exploat\u0103ri zero-click care permit hackerilor s\u0103 preia controlul asupra unui dispozitiv. Utilizatorul nu trebuie s\u0103 fac\u0103 clic pe un link, &hellip; <a href=\"https:\/\/microscopemedia.com\/?p=671625\" class=\"more-link\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":671626,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"Default","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/posts\/671625"}],"collection":[{"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=671625"}],"version-history":[{"count":0,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/posts\/671625\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=\/wp\/v2\/media\/671626"}],"wp:attachment":[{"href":"https:\/\/microscopemedia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=671625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=671625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/microscopemedia.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=671625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}