iPhone or Mac: two different ways of hacking

For most of us, the security provided by iOS and macOS is enough. So the devices and MacOS can rest easy knowing their data is safe.

But can they really sleep peacefully? It depends on the hacker decision. A determined hacker can discover a new way, and for the sake of truth, below we will look at two different ways of hacking on iPhone and MacOS devices.

Let's see how one can be used for hacking a Mac. The O.MG cable is an Apple Lightning charging cable with a twist. This twist can be modified to allow access to any Mac connected via a Wi-Fi network.

Watch the video

"Eventually, I was able to make the implant 100% in my home and then integrate it into a cable," says MG, the cable maker. "This particular cable costs around $ 200."

The O.MG cable also has a remote kill switch that can be used as a way to hide the hack.

iPhone

Regarding the hack on the iPhone, security researchers presented at Black Hat held in Las Vegas, a way to bypass iPhone ID's Face ID within 120 seconds.

Sounds scary, but in reality, this hack requires the owner of the device to sleep. Not just to fall asleep, but to dry in sleep, as the hacker will have to put a pair of custom glasses on the victim's face to trick the iPhone Face ID system.

With these glasses, the iPhone "thinks" that the owner is awake and trying to unlock his cell phone.

____________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).