Categories
Hack iPad

Dev-Team unlocks iPad 3G, posts hack online

You can try to keep people from jailbreaking Apple’s newest devices. Or you can take up shoveling water for fun and profit. Neither effort will really get you anywhere. Per iHackintosh, the iPad 3G was officially jailbroken with video proof released only a few hours after its launch. According the the article, the Dev-Team has […]

Categories
News

“Geohot” reveals untethered hack for iPhone, cites method will “probably” work for iPad

Over in the hacking domain, George Hotzhas demonstrated a new method to permanently “jailbreak” the iPhone 3GS, and he said the hack will “probably” work on the iPad, which goes on sale next week. Per AppleInsider, Hotz, known online as “Geohot,” posted a recent blog entry including video which demoed a jailbroken iPhone 3GS being […]

Categories
Hack iPhone

iPhone Dev Team Updates PwnageTool to Accommodate iPhone OS 3.1.3

It’s a conflict as old as time: Apple releases an iPhone OS update and the hacking/unlocking community releases an updated version of its software. For those of you who are happy to use an unlocked version of the iPhone, the iPhone Dev Team has released PwnageTool 3.1.5 that handles Apple’s newly-released iPhone OS 3.1.1 while […]

Categories
iPhone security

Second iPhone Worm in the Wild

We told you not to jailbreak your iPhone, but you had to be super cool and rebellious. Per BBC News, jailbroken iPhones could be vulnerable to a new, malicious worm that can allow remote access and control without the owner’s knowledge or permission. It’s been estimated that hundreds of users are currently affected by a […]

Categories
iPhone Software

Apple Modifies iPhone BootROM on 3GS Models to Stop Hacking Efforts

If you can’t beat them on software, change the BootROM. Per iClarified, Apple has taken an usual step in its efforts to stop groups from hacking its iPhone hardware and installed a modified iPhone 3GS BootROM. The report noted that the new iPhone is no longer vulnerable to the so-called “24kpwn” exploit. Over the years, […]