February 8, 2018

Unprecedented iPhone Source Code Leak

Crucial iPhone source code posted in unprecedented leak

Top secret Apple code for the iPhone's operating system was posted on Github.  The leak provides hackers and jailbreakers access to the device in dangerous ways, Motherboard reported.  The code, known as iBoot, has since been pulled, but Apple may have confirmed it was a production version of their operating system when it issued a DMCA takedown to Github.

Researchers and hackers could probe the leaked code for vulnerabilities, and in turn, create malicious and data mining apps within the Apple store and websites iPhone users visit.

Prior to this leak, Apple had introduced the "secure enclave co-processor" with the TouchID of the iPhone 5s.  With that, it was nearly impossible for hackers to even find bugs in iOS code, making iOS exploits relatively rare, unlike in Windows and Android.  As such, the iBoot leak is exposing code that very few people have seen before.

Update, 2/8/18 1:30 PM ET: Apple has given Engadget the following statement:

"Old source code from three years ago appears to have been leaked, but by design, the security of our products doesn't depend on the secrecy of our source code. There are many layers of hardware and software protections built into our products, and we always encourage customers to update to the newest software releases to benefit from the latest protections."

Latest Posts

July 16, 2021

Why End Point Detection (EDR) Offers Better Security

The rate at which new threats are being identified proves the inadequacy of traditional anti-virus software as a singular security measure. Considering its powerful and comprehensive threat-detecting abilities, SentinelOne proves to be a clear winner in any environment.

Read More
July 12, 2021

What is a Crypto Wallet and How to Secure it

There are various types of cryptocurrency wallets. The three prominent are offline, online, and those held by a custodian. Before we explain the differences between the three, it's important to note that a custodian, in this context, is an entity that holds your private key. Next, we'll go into what a private key is but first, let's dive deeper into the three types.‍

Read More
July 7, 2021

How to better defend against cyberattacks

The first and most crucial thing any company can do to reduce the likelihood of a cyberattack is to train their employees about cyberthreats and how to recognize them. This may seem obvious and intuitive, but the fact of the matter is that human error accounts for a large percentage of successful cyberattacks.

Read More

You have questions, we have answers

What can we help you with?