Categories
Accessory Apple Apps battery Hack Hacks Hardware iOS iOS 16 iOS 17 iPad iPad Air iPad mini iPad Pro iPadOS iPadOS 16 iPhone iPhone iPhone 12 iPhone 13 iPhone 14 iPhone 15 iPhone SE Legal Lightning Malware News privacy security Software USB-C

FBI’s Denver office issues warning about “juice jacking” attacks via public USB charging ports

It never hurts to be careful with where you plug in your devices. The FBI has once again warned the public against using public USB ports to recharge an iPhone or iPad, with “juice jacking” attacks infecting mobile devices connected to the ports. While most people are familiar with malicious apps and online attacks being […]

Categories
Accessory Apple Apps Business Developer Google Hack Hacks Hardware iPad iPad Air iPad mini iPad Pro iPhone iPhone iPhone 12 iPhone 13 iPhone 14 Legal Lightning Mac Malware News privacy retail Retail Store security Software Wi-Fi wireless

O.MG Elite device demonstrated at DEFCON, offers new hacking functionalities while disguised as Lightning cable

You might want to keep an eye out for this. A new version of the O.MG hacking tool has been released that looks like an unassuming Lightning cable, and can compromise a range of devices as well as inject commands, log keystrokes, and more. The O.MG Elite was recently demonstrated at the DEFCON cybersecurity conference […]

Categories
Hack Hardware iOS iPhone News security

Grayshift confronts extortion demands after parts of GrayKey source code stolen, published online

It helps to keep your proprietary source code same. Grayshift, the firm responsible for the GrayKey iPhone hacking tool, has been targeted an extortionist after its product’s source code was inadvertently exposed to the internet last week. An unknown third party seems to have stolen GrayKey’s source code and leaked part of it online. The […]

Categories
iOS iPad iPhone iPod Touch News security

Jonathan Zdziarski’s talk at hacker conferences shows backdoors on every iOS device, questionable services being run

There’s apparently a back door access point on every iOS device on the market. Per The Apple Core, forensic scientist and author Jonathan Zdziarski has posted the slides (in PDF format) from his talk at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS […]

Categories
Apple Consumer Electronics iOS iPhone Legal Mobile Mobile Phone News privacy security Services Software

Will the next NSA satellite have an Apple logo?

Well, perhaps that is a stretch, but Apple’s possible connection with the NSA was revealed in a report dating back to 2008. Reuters explains that the report outlined a system that the NSA was developing, called DROPOUTJEEP, which would be software implanted into an iPhone that allows infiltrators to push and pull and retrieve data from […]