iPhone Hacks 101: The Five Prime Signs You Should be Aware Of

In Tech
iPhone

This is not your average celebrity; the iPhone has been around for a decade. Without a doubt, it has been the center of consumer obsession. Thanks to its magnetic power, it has caught the eyes of hackers of every ilk, from seedy government contractors to white hats hoping to help Apple fix its mistakes.

So, let’s celebrate the device’s tenth birthday with these 5 significant iPhone hacks.

 

1.XcodeGhost

What is XcodeGhost?

XcodeGhost is a new iOS malware arising from a malicious version of Xcode, Apple’s official tool for developing iOS and OS X apps.

How does XcodeGhost put my iOS devices at risk? 
iOS apps infected with XcodeGhost malware can and do collect information about devices and then encrypt and upload that data to command and control (C2) servers run by attackers through the HTTP protocol. The system and app information that can be collected includes:

  • Current time
  • Current infected app’s name
  • The app’s bundle identifier
  • Current device’s name and type
  • Current system’s language and country
  • Current device’s UUID
  • Network type

 

2.One-text hack

One-text hack could allow an attacker to take over and fully control an iPhone remotely by simply clicking a link. One-text hack works as soon as a multimedia message was received and would hand over authentication information to the hacker.

 

3.One-text crash

The iMessage “Effective Power” bug (or “Unicode of Death”) would cause any iPhone in lock mode to repeatedly crash. The message simply read: “effective. Power لُلُصّبُلُلصّبُررً ॣ ॣh ॣ ॣ 冗”.

Apple couldn’t issue a software fix right away, so chose instead to offer a temporary fix before a full patch later in the summer. Given the number of users venting their annoyance across Reddit and Twitter, it may have been one of the most widely exploited iOS vulnerabilities ever.

 

4.Jailbreakme

Jailbreaking exploded in the early years of the iPhone. As hackers young and old broke down Apple’s security measures designed to keep devices under its control, a perpetual cat and mouse game emerged.

One of the more significant jailbreaks of during those heady days was Jailbreakme, created by then-teenager and future Apple employee Nicholas Allegra, then known only by his handle Comex. The first came in 2007, followed by sequels in 2010 and 2011.

To many in the community, Apple has improved a great deal since then, but jailbreaks continue to rain down, as global research teams seek to peal away the added layers of security.

 

5.Trident

Apple’s iOS 9 had a security flaw with a new zero-day vulnerability called Trident, which could allow the iPhone to be jailbroken, and then used to spy on the customer. But Apple, which is known to take device security very seriously, has responded to threat quickly and issued a new security update 9.3.5 for iOS users. Trident allows hackers to take full control of iPhones with a single click. The Trident vulnerabilities were being exploited by a software package called “Pegasus”.

 

You may also read!

ideas

The Mysteries of Coming Up with New Ideas

Practice discipline and you would know how to become successful. To perform well, you will need to practice it

Read More...
Age

There’s No Age Bar For Starting Your Own Business

Passion, plans, and a great work ethic always comes to play when you’re venturing out into a new business.

Read More...
Elasticus featured

elasticus Wants To Strengthen Your Business

Could a cyber-attack or natural disaster stop your business operating suddenly and permanently?  Our partnerships, locally and further abroad, bring unique

Read More...

Leave a reply:

Your email address will not be published.

Mobile Sliding Menu