technology

Is Your iPhone Safe? A New Finding Suggests Otherwise

You just need a Lightning cable to do the job

apple security requirement

Apple’s security is known to be one of the best among all the mobile handsets. Be it an iPhone, iPad or Apple Watch; security is something that is strenuous to be breached. But what if, someone can hack into your iPhone by entering password repeatedly? Yes, that’s what has happened recently.

By default, if you enter the wrong password multiple times, the iPhone tends to lock for a specific period. If you still try to log in again and again, iPhone may get locked for even years. But a security researcher has revealed a bug on iOS devices that can allow passcodes to be bypassed through a brute force attack.

Matthew Hickey, Co-Founder, Hacker House cybersecurity, got hold of a way to bypass the iPhone's security measures. The video reveals the way that allowed him to enter an unlimited number of passcodes on iPhone running iOS 11.3. The frightening concern over here is the fact that one can even breach into the latest version of Apple's mobile platform also.

"Instead of sending passcode one at a time and waiting, send them all in one go. If you send your brute-force attack in one long string of inputs, it'll process all of them, and bypass the erase data feature," Hickey explained in the video.

To do the trick, you just need a running iPhone and a Lightning cable. Once the iPhone is plugged, the hacker bombards the device with different combinations of the passcode. It triggers an interrupt request that is picked by the device immediately. This way, the device will be preoccupied with every new passcode. Ultimately, this technique allows the hacker to enter end number of passcodes.

Hickey claimed that the bug has been reported to the Apple, as it isn’t that complicated to identify.

However, Apple debunked the claim and labeled the finding as an "error." Michele Wyman, the Apple spokesperson, said, "The recent report about a passcode bypass on iPhone was in error and a result of incorrect testing."

Interestingly, Apple released a new Restricted mode feature in iOS 12 that cuts off an iPhone's ability to connect to a USB accessory plugged into it after an hour. So if someone tries to break into a device running iOS 12, the window to breach it will be only for 1 hour, and after that, the device will be locked.

Tanya <span>Editor In Chief</span>
Written By
Tanya Editor In Chief

She is a content marketer and has more than five years of experience in IoT, blockchain, Web, and mobile development. In all these years, she closely followed the app development, and now she writes about the existing and the upcoming mobile app technologies. Her essence is more like a ballet dancer.

Want To Hire The Best Service Provider?
MobileAppDaily will help you explore the best service providers depending on your vision, budget, project requirements and industry. Get in touch and create a list of best-suited companies for your needs.
technology

Evernote vs Google Keep: Clash Of The Top Productivity Apps

4 min read  

Nowadays, mobile and web apps are referred to as the backbone of any device like smartphones, tablets, desktops etc. And without apps, we may find ourselves back in the stone age. From favorite shooting games to cab-booking apps and from food delivery apps to basic reminder apps, there are a number

technology

Paranoid Android Got New Update With 7.2 Version Which Comes With New Features

4 min read  

Firstly, for the ones who are not aware of the Paranoid Android, it is an open source operating system for smartphones and tablet computers, based on the Android mobile platform. Paranoid Android surprised everyone with the stupendous features and upgrades a month ago with the release of the new ver

technology

Most Trending Cloud Computing Uses And Applications

4 min read  

Cloud computing has fast become an inevitable part of most of the business houses. The companies have rapidly moved forward from the conventional ways of data management to much-advanced Cloud Computing. Wikipedia describes Cloud Computing as, “an information technology paradigm that enables u

technology

5 IT Priorities For CIOs In 2018 And Beyond

4 min read  

2018 has been a year of changes for enterprise IT. Customer expectations are rising, and organizations need to exceed them. As IT continues to be an essential business function, on a par with finance or this hr management software, the IT budgets are coming into focus. With respect to that,

MAD Originals
MAD Originals

Cut to the chase content that’s credible, insightful & actionable.

Get the latest mashup of the App Industry Exclusively Inboxed

  • PRODUCTS
  • SERVICES
  • BOTH
Join our expansive network, build connections and expand your brand presence.