Apple claims that it had no knowledge of the existence of the malware used by the NSA to exploit iPhones

[youtube=http://www.youtube.com/watch?v=b0w36GAyZIA&w=580&h=370]

  DROPOUT JEEP is the name of a malware that I told you about on the last day of last year, when I told you that the American federal agency NSA he used it 3-4 years ago to gain access to iPhone files and control them. Although it is not known if this malware can still be used to exploit iOS, the NSA had a 100% exploitation rate for the terminals that came into its possession, so we are talking about powerful software, which Apple apparently does not would have known.

Apple has never worked with the NSA to create a backdoor in any of our products, including the iPhone. Additionally, we have been unaware of this alleged NSA program targeting our products. We care deeply about our customers' privacy and security. Our team is continuously working to make our products even more secure, and we make it easy for customers to keep their software up to date with the latest advancements. Whenever we hear about attempts to undermine Apple's industry-leading security, we thoroughly investigate and take appropriate steps to protect our customers. We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who's behind them.

  In a press statement provided on Tuesday, the Apple company says that did not collaborate with the NSA for the development of this kind of software and for its implementation in any product. Moreover, the company claims that it had no knowledge of the fact that the NSA was exploiting its iDevices in one way or another. From here on, the statement tells us about the continuous struggle carried out by Apple to secure its operating system against all types of attacks.

  The problem for users is that agencies of this kind will continue to exploit mobile terminals in the future because this is their goal and regardless of the manufacturers' efforts to secure their products, whenever vulnerabilities that can be exploited will be found.