Unprecedented iPhone Source Code Leak

April 9, 2025

Unprecedented iPhone Source Code Leak

Crucial iPhone source code posted in unprecedented leak
Top secret Apple code for the iPhone's operating system was posted on Github. The leak provides hackers and jailbreakers access to the device in dangerous ways, Motherboard reported. The code, known as iBoot, has since been pulled, but Apple may have confirmed it was a production version of their operating system when it issued a DMCA takedown to Github.

Researchers and hackers could probe the leaked code for vulnerabilities, and in turn, create malicious and data mining apps within the Apple store and websites iPhone users visit.

Prior to this leak, Apple had introduced the "secure enclave co-processor" with the TouchID of the iPhone 5s. With that, it was nearly impossible for hackers to even find bugs in iOS code, making iOS exploits relatively rare, unlike in Windows and Android. As such, the iBoot leak is exposing code that very few people have seen before.

If your organization uses Apple products and you’re concerned about mobile device vulnerabilities, iTecs offers comprehensive cybersecurity services and mobile device management to help mitigate risk.

Update, 2/8/18 1:30 PM ET: Apple has given Engadget the following statement:
"Old source code from three years ago appears to have been leaked, but by design, the security of our products doesn't depend on the secrecy of our source code. There are many layers of hardware and software protections built into our products, and we always encourage customers to update to the newest software releases to benefit from the latest protections."

Latest posts

How to Deploy Self-Hosting DeepSeek-R1 Using Ollama Implementation Guide
April 19, 2025

How to Deploy Self-Hosting DeepSeek-R1 Using Ollama Implementation Guide

Our Self-Hosting DeepSeek-R1 Using Ollama guide provides organizations with a comprehensive technical roadmap for deploying AI models within their own infrastructure. From hardware selection and installation to performance optimization and security hardening, this guide covers the complete implementation process with expert insights at each critical phase. Learn how to select appropriate model sizes based on your hardware capabilities, implement web interfaces for user access, and properly secure your AI deployment. This guide demonstrates how organizations can leverage powerful AI capabilities while maintaining complete data privacy and control.
Shutup10 Privacy Settings Tool
April 14, 2025

Shutup10 Privacy Settings Tool

Anyone who has configured a new installation of Windows 10 has seen there are a large amount of privacy, location and performance settings in the operating system. The sheer amount of selections available to adjust can be discouraging to even an experienced IT professional. Considering the multitude of options available it can be difficult, if almost impossible, to find them again later on - much less to remember them all! Enter O&O Software’s humorously named O&O ShutUp10.
Scam robocalls pretending to be Apple
April 14, 2025

Scam robocalls pretending to be Apple

We've received reports that customers are receiving calls from a company claiming to be Apple informing them that their Apple ID has been compromised. The culprits are calling random numbers, mainly in the United States. If you follow their prompts to "secure your account" you'll be transferred to a call center in India who will then try to get as much personal information from you as possible; they will try to get your credit card information to charge a fee to secure the compromised account.