Top secret Apple code for the iPhone's operating system was posted on Github. The leak provides hackers and jailbreakers access to the device in dangerous ways, Motherboard reported. The code, known as iBoot, has since been pulled, but Apple may have confirmed it was a production version of their operating system when it issued a DMCA takedown to Github.
Researchers and hackers could probe the leaked code for vulnerabilities, and in turn, create malicious and data mining apps within the Apple store and websites iPhone users visit.
Prior to this leak, Apple had introduced the "secure enclave co-processor" with the TouchID of the iPhone 5s. With that, it was nearly impossible for hackers to even find bugs in iOS code, making iOS exploits relatively rare, unlike in Windows and Android. As such, the iBoot leak is exposing code that very few people have seen before.
Update, 2/8/18 1:30 PM ET: Apple has given Engadget the following statement:
"Old source code from three years ago appears to have been leaked, but by design, the security of our products doesn't depend on the secrecy of our source code. There are many layers of hardware and software protections built into our products, and we always encourage customers to update to the newest software releases to benefit from the latest protections."
Cloud computing has been around for quite a while but it took some years before it became part of everyday language. Starting out it might have seemed too esoteric for many companies, but it's hard to imagine our current technological world without the cloud.
On average, it takes 100 days for ransomware or malware to be detected with traditional network security systems due to their inadequate visibility and limited ability to analyze advanced threats. A lot of damage can occur over 100 days. Due to the advanced programming of EDR, the 100-day average of detecting ransomware or malware drastically drops to just a matter of hours or even minutes.
iTecs is your IT solution for your business’s remote and onsite managed IT service needs. iTecs has the expertise to guide and consult with businesses regarding which technology and services are necessary to run quickly and efficiently. After consulting with you on the technology needs of your business, iTecs will procure and employ the programs, then monitor and provide maintenance, such as patch management and updates, and be on top of any issue within the system if it were to occur. It should not be the responsibility of your business to be an expert in IT. Instead of worrying about becoming the best in IT to protect your business, gain peace of mind by outsourcing your IT needs to the best MSP by partnering with iTecs. We do what we do best, so you can focus on being the best in your industry and taking your business to the next level.