February 8, 2018

Unprecedented iPhone Source Code Leak

Crucial iPhone source code posted in unprecedented leak

Top secret Apple code for the iPhone's operating system was posted on Github.  The leak provides hackers and jailbreakers access to the device in dangerous ways, Motherboard reported.  The code, known as iBoot, has since been pulled, but Apple may have confirmed it was a production version of their operating system when it issued a DMCA takedown to Github.

Researchers and hackers could probe the leaked code for vulnerabilities, and in turn, create malicious and data mining apps within the Apple store and websites iPhone users visit.

Prior to this leak, Apple had introduced the "secure enclave co-processor" with the TouchID of the iPhone 5s.  With that, it was nearly impossible for hackers to even find bugs in iOS code, making iOS exploits relatively rare, unlike in Windows and Android.  As such, the iBoot leak is exposing code that very few people have seen before.

Update, 2/8/18 1:30 PM ET: Apple has given Engadget the following statement:

"Old source code from three years ago appears to have been leaked, but by design, the security of our products doesn't depend on the secrecy of our source code. There are many layers of hardware and software protections built into our products, and we always encourage customers to update to the newest software releases to benefit from the latest protections."

Latest Posts

February 3, 2022

The Rise of SMS Phishing

After what seems like a lifetime of technology exposure, I still become saddened but not surprised when I hear about someone falling victim to a phishing attack. Most medium to large businesses, if not all, have invested heavily in employee awareness training as a means to improve their cybersecurity posture.

Read More
December 17, 2021

iTecs Enters Into A Partnership With Check Point

iTecs enters into a partnership with Check Point, a leader in enterprise and SMB cybersecurity products and solutions, to provide iTecs clients with efficacious cybersecurity protection. The collaboration between the two parties enables iTecs to deliver the various services and products to clients as a managed service.

Read More
September 8, 2021

How To Protect Crypto Exchange Accounts

Mitigate the chances that your crypto exchange accounts get hacked by following the tips below.‍You may have read articles of families losing their entire online Exchange accounts balances due to hackers breaching and stealing everything they own. Some of you may believe that the responsibility of these hacks is on the Exchanges, and I'm here to tell you this is usually not the case. Before you get angry, let me first explain the two types of hacks that occur that lead to you losing your entire investment.

Read More

You have questions, we have answers

What can we help you with?