technology

Is Your iPhone Safe? A New Finding Suggests Otherwise

You just need a Lightning cable to do the job

apple security requirement

Apple’s security is known to be one of the best among all the mobile handsets. Be it an iPhone, iPad or Apple Watch; security is something that is strenuous to be breached. But what if, someone can hack into your iPhone by entering password repeatedly? Yes, that’s what has happened recently.

By default, if you enter the wrong password multiple times, the iPhone tends to lock for a specific period. If you still try to log in again and again, iPhone may get locked for even years. But a security researcher has revealed a bug on iOS devices that can allow passcodes to be bypassed through a brute force attack.

Matthew Hickey, Co-Founder, Hacker House cybersecurity, got hold of a way to bypass the iPhone's security measures. The video reveals the way that allowed him to enter an unlimited number of passcodes on iPhone running iOS 11.3. The frightening concern over here is the fact that one can even breach into the latest version of Apple's mobile platform also.

"Instead of sending passcode one at a time and waiting, send them all in one go. If you send your brute-force attack in one long string of inputs, it'll process all of them, and bypass the erase data feature," Hickey explained in the video.

To do the trick, you just need a running iPhone and a Lightning cable. Once the iPhone is plugged, the hacker bombards the device with different combinations of the passcode. It triggers an interrupt request that is picked by the device immediately. This way, the device will be preoccupied with every new passcode. Ultimately, this technique allows the hacker to enter end number of passcodes.

Hickey claimed that the bug has been reported to the Apple, as it isn’t that complicated to identify.

However, Apple debunked the claim and labeled the finding as an "error." Michele Wyman, the Apple spokesperson, said, "The recent report about a passcode bypass on iPhone was in error and a result of incorrect testing."

Interestingly, Apple released a new Restricted mode feature in iOS 12 that cuts off an iPhone's ability to connect to a USB accessory plugged into it after an hour. So if someone tries to break into a device running iOS 12, the window to breach it will be only for 1 hour, and after that, the device will be locked.

Tanya <span>Editor In Chief</span>
Written By
Tanya Editor In Chief

She is a content marketer and has more than five years of experience in IoT, blockchain, Web, and mobile development. In all these years, she closely followed the app development, and now she writes about the existing and the upcoming mobile app technologies. Her essence is more like a ballet dancer.

Want To Hire The Best Service Provider?
MobileAppDaily will help you explore the best service providers depending on your vision, budget, project requirements and industry. Get in touch and create a list of best-suited companies for your needs.
technology

What is the role of Artificial Intelligence in the Legal Industry?

4 min read  

In the era of digitalization, mankind is innovating new technologies every day. One such technology that has gained high popularity among the business world is artificial intelligence and machine learning. Not a single industry, but every other industry in the market is likely to incorporate technol

technology

Top 10 Internet Of Things Technology Trends Prediction for 2020 by Gartner

4 min read  

Gartner’s list of best technologies is going to be revolutionary in terms of enabling the organizations to unveil the utmost potential of the Internet of Things technology in the coming years. The list is comprised of a wide range of new technologies and proficiency that most organizations sho

technology

How is Big Data Making a Difference in the Promotion of eLearning Apps?

4 min read  

The eLearning industry has made its mark in every corner of the world and undoubtedly will dominate in the future. It implies that the competition amongst course designers and developers will become all the more fierce and hence, they must find unique ways to raise their bar. According

technology

Why You Should Bother With Custom Marketing Software?

4 min read  

Despite the layman’s misconceptions that marketing is designing a few pretty posters, slogans, and emails, there’s much more that goes on behind the scenes. It is, in fact, a complex process that first understands the needs and desires of the target group, and then speaks to them using a

MAD Originals
MAD Originals

Cut to the chase content that’s credible, insightful & actionable.

Get the latest mashup of the App Industry Exclusively Inboxed

  • PRODUCTS
  • SERVICES
  • BOTH
Join our expansive network, build connections and expand your brand presence.