iTecs IT Outsourcing and Support Blog
Top secret Apple code for the iPhone's operating system was posted on Github. The leak provides hackers and jailbreakers access to the device in dangerous ways, Motherboard reported. The code, known as iBoot, has since been pulled, but Apple may have confirmed it was a production version of their operating system when it issued a DMCA takedown to Github.
Researchers and hackers could probe the leaked code for vulnerabilities, and in turn, create malicious and data mining apps within the Apple store and websites iPhone users visit.
Prior to this leak, Apple had introduced the "secure enclave co-processor" with the TouchID of the iPhone 5s. With that, it was nearly impossible for hackers to even find bugs in iOS code, making iOS exploits relatively rare, unlike in Windows and Android. As such, the iBoot leak is exposing code that very few people have seen before.
Update, 2/8/18 1:30 PM ET: Apple has given Engadget the following statement:
"Old source code from three years ago appears to have been leaked, but by design, the security of our products doesn't depend on the secrecy of our source code. There are many layers of hardware and software protections built into our products, and we always encourage customers to update to the newest software releases to benefit from the latest protections."
Ransomware is becoming more common due to the success the creators are enjoying due to the improvement of their methods. What were once simple text-based phishing emails are becoming very realistic looking “corporate” fakes.Read More
G-Suite or Office 365 this is the question that has stumped small to medium-sized business owners for years. Now businesses are looking to move into the cloud and need to know where to start and who to use. Some of the most important factors to consider are security, integration, functionality, and usability.Read More
The majority of people use weak or reuse passwords on different websites. How can someone use a complex, unique password on all of the websites and applications you use? The answer is a password manager.Read More