iPhone or Mac: two different ways of hacking

For most of us, the security provided by iOS and macOS is enough. So iPhone and MacOS users can sleep easy knowing their data is safe .

But can they really sleep peacefully? It depends on the hacker decision. A determined hacker can discover a new way, and for the sake of truth, below we will look at two different ways of hacking on iPhone and MacOS devices.

Ας δούμε πώς μπορεί να χρησιμοποιηθεί ένα καλώδιο για την ενός Mac. Το καλώδιο O.MG είναι ένα καλώδιο φόρτισης Apple Lightning με twist. Αυτό το twist μπορεί να τροποποιηθεί για να επιτρέπει την πρόσβαση σε οποιονδήποτε Mac έχει συνδεθεί μέσω ενός δικτύου Wi-Fi.

Watch the video

"Eventually, I was able to make the implant 100% in my home and then integrate it into a cable," says MG, the cable maker. "This particular cable costs around $ 200."

The O.MG cable also has a remote kill switch that can be used as a way to hide the hack.

iPhone

Regarding the hack on the iPhone, security researchers presented at Black Hat held in Las Vegas, ένα τρόπο να παρακάμψουν το σύστημα αναγνώρισης Face ID του iPhone μέσα σε 120 δευτερόλεπτα.

Sounds scary, but in reality, this hack requires the owner of the device to sleep. Not just to fall asleep, but to dry in sleep, as the hacker will have to put a pair of custom glasses on the victim's face to trick the iPhone Face ID system.

With these glasses, the iPhone "thinks" that the owner is awake and tries to unlock it of.

____________________

iGuRu.gr The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive of new posts by email.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).