For most of us, the security of iOS and macOS is enough. So iPhone and MacOS users can sleep soundly, as they are sure that their data is safe.
But can they really sleep peacefully? It depends on the hacker decision. A determined hacker can discover a new way, and for the sake of truth, below we will look at two different ways of hacking on iPhone and MacOS devices.
Let's see how one can be used cable for infringement of a Mac. The O.MG cable is a cable loading Apple Lightning with a twist. This twist can be modified to allow access to any Mac connected via a Wi-Fi network.
Watch the video
OMG! 2 months + 8 devs + O•MG Cable = malicious wireless implant Update!
— MG (@_MG_) April 12, 2019
This update brought to you by the chaos workshop elves: @d3d0c3d, @pry0cc, @clevernyyyy, @JoelSernaMoreno, @evanbooth, @noncetonic, @cnlohr, @RoganDawes
More info: https://t.co/kkhUppsqiC#OMGCable pic.twitter.com/fIzOaKJSxL
"Eventually, I was able to make the implant 100% in my home and then integrate it into a cable," says MG, the cable maker. "This particular cable costs around $ 200."
The O.MG cable also has a remote kill switch that can be used as a way to hide the hack.
Regarding the iPhone hack, researchers security, presented at Black Hat held in Las Vegas, a way to bypass iPhone ID's Face ID within 120 seconds.
Sounds scary, but in reality, this hack requires the owner of the device to sleep. Not just to fall asleep, but to dry in sleep, as the hacker will have to put a pair of custom glasses on the victim's face to trick the iPhone Face ID system.
With these glasses, the iPhone "thinks" that the owner is awake and trying to unlock his cell phone.
____________________
- Digital steganography: What is digital steganography?
- How file compression works
- Google Chrome Advanced Protection Program
- Microsoft VBScript disables it by default