Category Archives: Apple

Apple is a company that designs and manufactures computer devices. It is not immune to hackers who try by all means to hack their system.

IPhone cable hacks into computers

In the controversy of iPhone phones, he reached us yet another information with another rather simple and physical way to hack the devices via modified iPhone cables.

Indeed a cybersecurity expert informs having managed to create a cable modified iPhone allowing by USB connection to hack computers This computer security researcher is identified under the pseudonym MG.

This article will also interest you: iPhone is vulnerable by its iMessage app

He managed to change the behavior of the cable lightning mobile iPhone video by adding to it was a hardware that could allow hackers to access and even control a terminal remotely.

The O.Cable, that's what we call works properly like all other cables. That is, once connected, it not only allows you to charge the phone but also establish a connection between the mobile and the terminal. However, with the modification of the computer security researcher it can also allow to control this same terminal. And this becomes possible from the moment the cable is inserted directly into the device of the device once. This gesture accomplished, the hackers will have full access to the device remotely.

It is extraordinary in history is that without same internet connection the hacker is still able to control the device if it is at least 90 metres away. bright increasingly endangering the safety of digital users.

However, this is only one test he has carried out in the goal of once again building a loophole that exists in our information systems.

Thanks to the connection, the hacker can also use phishing method by displaying images on the terminal screen, web pages or windows that could induce the user to error.

The system has also made it possible to lock the screen remotely from the computer and even steal the identifiers user's connection when they connect with the same device.

To sum up this hacking technique allows to have full access and also to have extensive control of the terminal.

"It's like be able to sit near the victim's keyboard and mouse, but without really be," the MG expert said.

The designer of this hacking method claims that it is possible for the hacker to remotely turn off the chip so that it is undetectable. He also notes that his first experiment to test on iPhone cables is not limited to it. But it is possible to implant its chip on all other mobile cables. For his part, he believes that this is an experiment to improve the context of computer security because the fight against cybercrime is currently raging and this is his part in the contribution of this fight.

Now access an unlimited number of passwords:

Check out our hacking software

iPhone is vulnerable by its iMessage app

After the Android vulnerabilities long exposed these days, the trick has come for iOS.

Indeed, recently, the American digital giant discovered that there was a way to hack his smartphone via the integrated messaging service: iMessage.

This article will also interest you: Apple promises 1 million dollars for whoever hacks his iPhone

Most fun of all, the discovery of the security flaw comes just a short time after Apple announced the biggest Bug Bounty in its history. After his offer of one million dollars ($1,000,000) for the discovery on one of its terminals, it was immediately discovered that hacking the iPhone was so easy.

Indeed, a single message sent on the iMessage app would be enough to bypass all the defense measures installed on the device. And for good reason, this application is not up to the level in terms of security compared to others. And this could be explained by its too many features (photos, emojis, sounds). This range of use then makes the protections very weak, allowing to be hacked without interaction, something that seemed almost impossible.

According to Nathan Silvanovich, an expert researcher in cybersecurity, messages may be bugs that will open up access to users. And this would apparently be possible without the user opens his e-mail. Thus, the mere fact that this app is present is a fault in itself. In this words, she notes: "These messages can be turned into the kind of bugs that will run code and may eventually be used for tasks such as access to your data."

In addition, non-interaction attacks are very difficult to repel given their subtleties. When we thought that only messaging services such as WhatsApp were generally the few open to these kinds of flaws, iMessage brings us back to reason.

So far, no patches have been deployed to counter the flaw. In other words, iPhone holders are on probation. It is also recommended that all Apple brand users update their devices as soon as possible on iOS or MacOS. It should be noted that since July, several flaws had been found and the American giant had notified that it had been able to correct six (6).

This means that with the messaging service, Apple is in a big security concern that tarnishes its image as usual. The evil in this story is that users have virtually nothing to protect themselves from this vulnerability except to trust the manufacturer and highly hope that this problem will solve it, if that is possible of course.

It should also be noted that the Checkpoint organization had also discovered for some time a flaw that would exist for more than four (4) years and that would allow with a little subtlety to plant an iPhone or various things. This flaw would lie at the level of contact software was revealed to Apple. We're still waiting for the patches.

Now access an unlimited number of passwords:

Check out our hacking software

Apple promises $1 million for whoever hacks its iPhone

Long decried for the vulnerabilities of these devices, the American digital giant Apple has made a very reluctant announcement.

Indeed, at the famous Black Hat event held regularly in Las Vegas, the firm promised a big reward for any reports of flaws that could be exploited by malicious hackers.

This article will also interest you: How to protect yourself from spying on your iPhone?

This time, Apple promises the trifle of one million dollars (1,000,000). There was a rumor about it and it was confirmed. This security-fault race program is now open to everyone. Anyone who feels able could have fun analyzing the codebars of all Apple systems (Watch OS, MacOs, icloudOS or iOS).

This program finds its name in the jargon. The Bounty bug, that's what it's called.

On the other hand, it should be noted that this hunt for security has been launched since 2016. It has hither many concerns that the system iOS and was only reserved for the computer security researcher who was hand-picked. Today, everyone can practice to find flaws on all of the giant's operating systems Apple.

In the logic of the firm, one can assume that it wants to anticipate any disclosure of information about its vulnerability to unbeknownst to him, when we know that their system is not deemed to be the safest.

It is recalled that prior to its recent statement, Apple offered between twenty-five thousand dollars ($25,000) two hundred thousand dollars ($200,000). Gone to a million (1,000,000). Enough to warm up the Heat. But behind this almost extravagant offer, Apple clearly wants to prevent researchers who will discover the flaws in these systems from don't sell them to other people.

In addition, the firm has indicated that it will researchers' disposal of less secure models of his iPhone to give a wider field of our bug searches.

In addition, it would appear that there will be a bonus fifty percent (50%) from the perspective where vulnerabilities will be detected in the vacuum at the beta stage. Also a five-year reward hundreds of dollars ($500,000,000) for the discovery of bugs or flaws to allow a hacker to fraudulently access the data of the users

What should be observed is that this announcement of the American giant has already reached all ends of the community computer science. We are curious to know what he will add for information they will publish online. It is considered to be a very significant gesture. However, there are questions about the deterrence capacity and its impact on illegal hackers who are determined to invest fully in certain illegal activities

For the record, let's remember that earlier this year, Linus Henze, a German hacker, discovered a security flaw on a macOS. If you feel like a fault seeker, don't hesitate, 1,000,000 are waiting for you.

Now access an unlimited number of passwords:

Check out our hacking software