Logo
technology

Is Your iPhone Safe? A New Finding Suggests Otherwise

You just need a Lightning cable to do the job

apple security requirement

Apple’s security is known to be one of the best among all the mobile handsets. Be it an iPhone, iPad or Apple Watch; security is something that is strenuous to be breached. But what if, someone can hack into your iPhone by entering password repeatedly? Yes, that’s what has happened recently.

By default, if you enter the wrong password multiple times, the iPhone tends to lock for a specific period. If you still try to log in again and again, iPhone may get locked for even years. But a security researcher has revealed a bug on iOS devices that can allow passcodes to be bypassed through a brute force attack.

Matthew Hickey, Co-Founder, Hacker House cybersecurity, got hold of a way to bypass the iPhone's security measures. The video reveals the way that allowed him to enter an unlimited number of passcodes on iPhone running iOS 11.3. The frightening concern over here is the fact that one can even breach into the latest version of Apple's mobile platform also.

"Instead of sending passcode one at a time and waiting, send them all in one go. If you send your brute-force attack in one long string of inputs, it'll process all of them, and bypass the erase data feature," Hickey explained in the video.

To do the trick, you just need a running iPhone and a Lightning cable. Once the iPhone is plugged, the hacker bombards the device with different combinations of the passcode. It triggers an interrupt request that is picked by the device immediately. This way, the device will be preoccupied with every new passcode. Ultimately, this technique allows the hacker to enter end number of passcodes.

Hickey claimed that the bug has been reported to the Apple, as it isn’t that complicated to identify.

However, Apple debunked the claim and labeled the finding as an "error." Michele Wyman, the Apple spokesperson, said, "The recent report about a passcode bypass on iPhone was in error and a result of incorrect testing."

Interestingly, Apple released a new Restricted mode feature in iOS 12 that cuts off an iPhone's ability to connect to a USB accessory plugged into it after an hour. So if someone tries to break into a device running iOS 12, the window to breach it will be only for 1 hour, and after that, the device will be locked.

Tanya <span>Editor In Chief</span>
Written By
Tanya Editor In Chief

She is a content marketer and has more than five years of experience in IoT, blockchain, Web, and mobile development. In all these years, she closely followed the app development, and now she writes about the existing and the upcoming mobile app technologies. Her essence is more like a ballet dancer.

Want To Hire The Best Service Provider?
MobileAppDaily will help you explore the best service providers depending on your vision, budget, project requirements and industry. Get in touch and create a list of best-suited companies for your needs.

Featured Blogs

technology

Comparing Different Android Versions: Lollipop Vs Marshmallow Vs Nougat

4 min read  

Google’s Android has certainly revolutionized the smartphone landscape right from its inception. With a host of Android mobile apps, the operating system has taken the mobile app development industry by the storm. Since the release of the very first Android version, it has become a favorite op

technology

How To Download Music From YouTube: Step By Step Guide

10 min read  

Keep yourself trustworthy connection is a piece of advice that we have all been listening from our elders all these years. And it makes sense also even in the music when you are looking forward to download the authentic links. Although to download music from YouTube is a practice that a number of us

technology

How Technology Can Help You Manage Compliance Better

2 min read  

Whether your operations rely on machine learning, Big Data, or artificial intelligence (AI), it is critical to streamlining your information security monitoring efforts. Having a strong cybersecurity risk mitigation program that is built upon regulatory compliance will help to keep your organization

technology

A Guide On The Four Levels of Software Testing

4 min read  

Software testing aims to ensure that a finished product is functional and up to the standards set forth by the client; this usually involves checking various aspects of the app that deal with performance, functionality, and overall UX. All levels of software testing consider the app's o

Featured Interviews

Interview

Interview With Coyote Jackson, Director of Product Management, PubNub

MobileAppDaily had a word with Coyote Jackson, Director of Product Management, PubNub. We spoke to him about his journey in the global Data Stream Network and real-time infrastructure-as-a-service company. Learn more about him.

MAD Team 4 min read  
Interview

Interview With Laetitia Gazel Anthoine, Founder and CEO, Connecthings

MobileAppDaily had a word with Laetitia Gazel Anthoine, Founder and CEO, Connecthings. We spoke to her about her idea behind Connecthings and thoughts about the company’s services.

MAD Team 4 min read  
Interview

Interview With Gregg Temperley, Founder Of ParcelBroker App

MobileAppDaily had a word with Gregg Temperley, Founder. We spoke to him about his idea behind such an excellent app and his whole journey during the development process.

MAD Team 4 min read  
Interview

Interview With George Deglin, CEO Of OneSignal

MobileAppDaily had a word with George Deglin, the CEO and co-founder of OneSignal, a leading customer messaging and engagement solution, we learn multiple facets related to customer engagement, personalization, and the future of mobile marketing.

MAD Team 4 min read  
MAD Originals
MAD Originals

Cut to the chase content that’s credible, insightful & actionable.

Get the latest mashup of the App Industry Exclusively Inboxed

  • PRODUCTS
  • SERVICES
  • BOTH
Join our expansive network, build connections and expand your brand presence.