HackDig : Dig high-quality web security articles for hacker

Checkm8 jailbreak and AltStore put cracks in Apple’s walled garden

byDanny BradburyJailbreaking iPhones has become a lot harder with each new version of the hardware, but this weekend saw two new announcements that enable people to install apps on their phones. One of them is a traditional jailbreak, while the other is an alternative app store that uses a loophole in Apple’s code-signing process.Jailbreaking is a form
Publish At:2019-09-30 12:45 | Read:254 | Comments:0 | Tags:Apple iOS Mobile App Store iPhone jailbreak jailbreaking

New iOS exploit checkm8 allows permanent compromise of iPhones

UPDATE 9/27, 11:00am: Updated for the misconception that the bootrom was actually being modified. Apparently, the “permanent” only refers to the fact that the bug is in the bootrom, where it cannot be patched. UPDATE 9/27, 12:15am: After speaking with @axi0m8, clarified a few other points, including the fact that this cannot be exploited remot
Publish At:2019-09-27 23:20 | Read:272 | Comments:0 | Tags:Mac Apple apple security apple vulnerability checkm8 exploit

Apple Watch Series 5 Review: incremental changes for a solid device

In just four and a half years, the Apple Watch has gone from a whim with vague use cases to a solid device that has found its stride. This year's model, the Series 5, builds on the previous iteration with small, incremental changes, to provide a solid, useful device.The history of the Apple Watch has been brief, and has been marked by some major changes: the
Publish At:2019-09-27 22:10 | Read:263 | Comments:0 | Tags:Apple Apple Watch

Review: iPhone 11, the iPhone for everyone

Last year, I got on Apple‘s iPhone upgrade program to be able to change my phone every year without having the hassle of selling an old one on eBay. Given that I was spreading the cost out over monthly payments, at 0% interest, I decided to go for the best model: the iPhone XS Max. As I wrote on this blog, it was a wonderful phone, but at a high price. And e
Publish At:2019-09-27 22:10 | Read:171 | Comments:0 | Tags:Apple iPhone iPhone 11

Tethered jailbreaks are back

Earlier today, a new iPhone Boot ROM exploit, checkm8 (or Apollo or Moonshine), was published on GitHub by axi0mX, affecting the iPhone 4S through the iPhone X. The vulnerability was patched in devices with A12 and A13 CPUs. As of this writing, the iPhone XS, XS Max, XR, 11, 11 Pro and 11 Pro Max are all safe from this exploit. We strongly urge all journalis
Publish At:2019-09-27 16:30 | Read:198 | Comments:0 | Tags:Apple Exploits iVerify

iPhone Users: Here’s What You Need to Know About the Latest iOS Hacks

iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently discovered that someone has been exploiting multiple iPhone vulnerabilities for the last two years. How? Simply by getting users to visit a website. How exactly does this exploitation campaign work? According to WIRED, researchers revealed
Publish At:2019-09-19 23:20 | Read:284 | Comments:0 | Tags:Consumer Threat Notices Apple cybersecurity IoT malware mobi

Apple updates iPhone, Apple Watch, and iPad; gives info on Apple Arcade and Apple TV+

"Spring ahead, fall new iPhone." I think that's what they say. Like clockwork now since 2014 and the release of the iPhone 4S, Apple this week announced the latest model of the iPhone along with other new products and services.Eschewing the Roman numeral naming for the device, this one goes to 11. (I know, it's a cliché, and fortunately, Apple didn't use it.
Publish At:2019-09-19 16:40 | Read:137 | Comments:0 | Tags:Apple Apple Arcade Apple Event Apple TV Apple Watch iPad iPh

From The Depths Of Counterfeit Smartphones

In an age of online second-hand retailers, marketplace exchanges, and third-party refurb shops, it’s easier than ever to save hundreds of dollars when buying a phone. These channels provide an appealing alternative for people foregoing a retail shopping experience for a hefty discount. However, there is an additional option for those bargain hunters seeking
Publish At:2019-09-19 16:00 | Read:155 | Comments:0 | Tags:Apple Malware

Hackers leak WhatsApp screenshots and intimate photos of WWE Diva Paige

A new batch of WhatsApp screenshots and intimate photos of the WWE celebrity Diva Paige was published on a popular celebrity leak website. In March, hackers leaked online nude photos and videos of WWE Diva Paige (real name is Saraya Jade-Bevis), and now a new batch of x-rated images of the celebrity appeared on the Internet. Personal and private photos of m
Publish At:2017-11-06 10:45 | Read:7358 | Comments:0 | Tags:Breaking News Hacking Apple brute force celebrities data lea

Preparing for the iPhone X and the Future of Facial Recognition Technology

As we approach the holiday season, both consumers and IT professionals are considering replacing their old devices with a whole new lineup of smartphones, phablets and tablets. Whether you’re treating yourself, adding to your wish list or considering options for your next enterprise rollout, it’s important to weigh the pros and cons of introducin
Publish At:2017-11-04 02:00 | Read:3154 | Comments:0 | Tags:Mobile Security Apple Authentication Biometric Mobile Securi

Millions of Macs open to EFI Firmware Hacks even if they are up-to-date

A group of researchers with Duo Security demonstrated that millions of Up-to-Date Apple Macs are vulnerable to EFI Firmware attacks. In 2015, the security researcher Trammell Hudson demonstrated at the Chaos Computer Congress in Hamburg, how it is possible to infect Apple Mac PCs exploiting the Thunderbolt port. Since the disclosure of the attack against th
Publish At:2017-10-01 02:25 | Read:3041 | Comments:0 | Tags:Breaking News Hacking Reports Apple bootkit EFI hack OS X Th

iXintpwn/YJSNPI Abuses iOS’s Config Profile, can Crash Devices

by Hara Hiroaki, Higashi Yuka, Ju Zhu, and Moony Li While iOS devices generally see relatively fewer threats because of the platform’s walled garden approach in terms of how apps are installed, it’s not entirely unbreachable. We saw a number of threats that successfully scaled the walls in 2016, from those that abused enterprise certificates to ones th
Publish At:2017-09-19 00:55 | Read:4338 | Comments:0 | Tags:Mobile Apple iOS iOS Configuration Profile iXintpwn YJSNPI I

6 Million Celebrities Instagram High-Profiles Data available for sale on DoxaGram

Doxagram website claims to be selling the email addresses and phone numbers of 6M High-Profiles Instagram accounts ranging from POTUS to Taylor Swift. The story began with the hack of the Selena Gomez Instagram account, a hacker hijacked it and published three nude photos of Justin Bieber. A few days later, it was reported a vulnerability in the Instagram
Publish At:2017-09-02 08:30 | Read:3206 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Hacking Apple celebrit

Hackers exploited an Instagram flaw access celebrity profile data

An Instagram flaw allowed hackers to access profile information for high-profile users, the incident was confirmed by the company. Instagram has recently suffered a possibly serious data breach with hackers gaining access to the phone numbers and email addresses for many “high-profile” users. Hackers recently accessed personal information of R
Publish At:2017-08-31 16:20 | Read:3067 | Comments:0 | Tags:Breaking News Hacking Apple brute force celebrities iCloud i

Selena Gomez Instagram hacked! Hackers post Bieber nude photos

Selena Gomez Instagram account has reportedly been hacked. Nude photos of singer Justin Bieber have been published by hackers. Unknown hackers have compromised the Instagram account owned by Selena Gomez and posted nude photographs of her ex-boyfriend Justin Bieber. Source Tribune.com The hack doesn’t seem to be associated with the recent Fappening 201
Publish At:2017-08-30 21:15 | Read:3344 | Comments:0 | Tags:Breaking News Hacking Apple brute force celebrities iCloud i

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud