Users on Twitter have been complaining about a bug in the Calculator app in iOS 11. Apparently, typing in 1+2+3= in the calculator too fast, results in it displaying the incorrect answer.
What’s actually happening here is that visual frills for the app are interfering with its efficiency. Basically, there’s a bit of lag in the animation when you type two or more numbers together, so it misses out some key presses. And the weird part is, this glitch has been around since iOS 11 was in beta testing.
Basically, the calculator ignores inputs here and there unless you’re typing slowly enough to account for your keypad lighting up. If a key is still highlighted, hitting another key will not do anything, it just won’t register.
A few users have also experience similar issues in older versions of iOS, but it’s much more noticeable in iOS 11, to the point where it can make the app almost unusable unless you’re typing agonisingly slow.
Apple seems to be aware of the issue, as one employee tweeted that more than 70 filed have filed a report pointing out the bug to the company.
In case you’re tempted to write a Radar on this, 70+ people have beaten you to it. https://t.co/xrMwJHqHiH
— Chris Espinosa (@cdespinosa) October 24, 2017
Now it’s just a matter of waiting to see if all the attention forces apple to patch the issue sooner.
Security researchers competing at Mobile Pwn2Own 2017 were able to hack various smartphones, including Apple’s brand new iOS 11.1 software.
Apple released iOS 11.1 on Halloween and the operating system was hacked multiple times at Zero Day Initiative’s (ZDI) Mobile Pwn2Own on Nov. 1 and 2. Tencent Keen Security Lab did the most damage at the competition with two successful hacks of iOS 11 running on an iPhone 7.
On day one of Mobile Pwn2Own, the Keen Lab team was able to successfully load a rogue application and have it persist through a reboot with a WiFi exploit that used a total of four different vulnerabilities to execute. It is unknown what bugs were used, but Apple had previously confirmed the recently disclosed KRACK WiFi flaw was patched in iOS 11.1, so this would have been a different WiFi issue.
However, one of the bugs used by Keen Lab on day one was also used by Qihoo 360 Security, of China, in a WiFi hack on iOS 11.1 on day two. Dustin Childs, in charge of ZDI communications for Trend Micro, said this was a surprising event.
“After a successful demonstration, things got a bit murky in the disclosure room. 360 Security used three separate bugs to exploit WiFi on the iPhone, but one of the bugs was submitted in a previous attempt in the contest by a different competitor,” Childs wrote in a blog post. “While the intrigue of a bug collision is certainly interesting, let’s not overlook the fact that 360 Security demonstrated an exploit that exfiltrated data from an iPhone just by connecting it to a WiFi network.”
On day one, Keen Lab also separately hacked iOS 11 by exploiting a Safari browser bug and a system service flaw in order to get its rogue application to persist through a reboot. For its efforts at Mobile Pwn2Own, Keen Lab earned a total of $155,000.
Richard Zhu, security researcher also known as fluorescence, successfully exploited a Safari browser flaw and another bug to escape the iOS sandbox and execute code, earning $25,000.
Mobile Pwn2Own 2017 roundup
Itzhak “Zuk” Avraham, founder of Zimperium, Inc., said on Twitter it’s important for users to realize even new and updated phones are at risk.
“If mobile pwn2own this year tells us one thing: phones are totally insecure. Not even speaking about old/outdated phones. This is the golden age for offensive security companies. If you care about your data, prepare accordingly,” Avraham wrote on Twitter. “If multiple groups were able to hack so many different models remotely, including multiple baseband submissions, we, as users, are in trouble. Unfortunately, this is totally aligned with what I’m personally seeing in the wild.”
In total, day one of Mobile Pwn2Own 2017 had five successful hack attempts across various devices and two failed attempts, while day two had six more attempts which were all successful.
ZDI said Mobile Pwn2Own 2017 was its largest mobile contest ever with a total of 32 unique bugs submitted. The 11 successful attacks came against the Samsung Galaxy S8, Huawei Mate9 Pro and Apple iPhone 7.
Lukas Stefanko, malware researcher at ESET, noted one major smartphone was not hacked during the competition.
— Lukas Stefanko (@LukasStefanko)
November 2, 2017