iPhone Hacks 101: The Five Prime Signs You Should be Aware Of

In Tech

This is not your average celebrity; the iPhone has been around for a decade. Without a doubt, it has been the center of consumer obsession. Thanks to its magnetic power, it has caught the eyes of hackers of every ilk, from seedy government contractors to white hats hoping to help Apple fix its mistakes.

So, let’s celebrate the device’s tenth birthday with these 5 significant iPhone hacks.

 

1.XcodeGhost

What is XcodeGhost?

XcodeGhost is a new iOS malware arising from a malicious version of Xcode, Apple’s official tool for developing iOS and OS X apps.

How does XcodeGhost put my iOS devices at risk? 
iOS apps infected with XcodeGhost malware can and do collect information about devices and then encrypt and upload that data to command and control (C2) servers run by attackers through the HTTP protocol. The system and app information that can be collected includes:

  • Current time
  • Current infected app’s name
  • The app’s bundle identifier
  • Current device’s name and type
  • Current system’s language and country
  • Current device’s UUID
  • Network type

 

2.One-text hack

One-text hack could allow an attacker to take over and fully control an iPhone remotely by simply clicking a link. One-text hack works as soon as a multimedia message was received and would hand over authentication information to the hacker.

 

3.One-text crash

The iMessage “Effective Power” bug (or “Unicode of Death”) would cause any iPhone in lock mode to repeatedly crash. The message simply read: “effective. Power لُلُصّبُلُلصّبُررً ॣ ॣh ॣ ॣ 冗”.

Apple couldn’t issue a software fix right away, so chose instead to offer a temporary fix before a full patch later in the summer. Given the number of users venting their annoyance across Reddit and Twitter, it may have been one of the most widely exploited iOS vulnerabilities ever.

 

4.Jailbreakme

Jailbreaking exploded in the early years of the iPhone. As hackers young and old broke down Apple’s security measures designed to keep devices under its control, a perpetual cat and mouse game emerged.

One of the more significant jailbreaks of during those heady days was Jailbreakme, created by then-teenager and future Apple employee Nicholas Allegra, then known only by his handle Comex. The first came in 2007, followed by sequels in 2010 and 2011.

To many in the community, Apple has improved a great deal since then, but jailbreaks continue to rain down, as global research teams seek to peal away the added layers of security.

 

5.Trident

Apple’s iOS 9 had a security flaw with a new zero-day vulnerability called Trident, which could allow the iPhone to be jailbroken, and then used to spy on the customer. But Apple, which is known to take device security very seriously, has responded to threat quickly and issued a new security update 9.3.5 for iOS users. Trident allows hackers to take full control of iPhones with a single click. The Trident vulnerabilities were being exploited by a software package called “Pegasus”.

 

You may also read!

LDJ Capital

LDJ Capital: Providing Wealth Advice That Is Not Colored by Any Agenda

Everyone’s greatest apprehension in hiring wealth advisors is being subject to an advisor’s agenda to sell a particular product

Read More...

Get Strong with Urban Strength — Developing Real World Strength

Gymnasts are the true icons of functional strength— pulling and pressing themselves from mind-blowing positions. The fundamentals derived from

Read More...
Centre For Leadership Advantage

Centre For Leadership Advantage: Bringing You the Most Progressive, Fit-For-Purpose Thinking, Approaches, Methodologies and Solutions in Leadership

Centre for Leadership Advantage is a consulting team of organisational psychologists, scientist-practitioners, leadership specialists and thought leaders providing psychological

Read More...

Leave a reply:

Your email address will not be published.

5 × = 5

Mobile Sliding Menu