Patch

JailbreakMe for Pangu 9.3.3: details and tutorial

As reported recently on iDB, Luca Todesco has decided to solve the certification problems which have plagued the most recent Pangu release for 9.2-9.3.3, by making public a web-based tool for re-activating the jailbreak.

After doing some testing and research it seemed appropriate for a more in-depth discussion of the tool, along with a walkthrough, in order to address some of the more technical questions surrounding this latest development in the jailbreaking scene.

Latest Pokémon GO update blocks jailbreakers, but here’s a workaround

The latest Pokémon GO update blocks jailbreakers from using the game in a move to crack down on third-party apps and tweaks that harvest data for Pokémon tracking and cheating.

Of course, not all jailbreakers cheat in Pokémon GO, so it's a pretty harsh assumption on their part, so in this piece, we'll discuss how you can run Pokémon GO on your jailbroken device even if you have the latest update.

Ryan Petrich releases jailbreak tweak to patch iOS 7 Mail encryption bug

Earlier this week, word got out that there's a gap in security in iOS. Security researcher Andreas Kurtz discovered  that all versions of iOS 7.1, and at least iOS 7.0.4, don't encrypt email attachments.

Kurtz says that he has informed Apple of the bug, and they are working on a fix, but there's no word when it will be available. Fortunately, the jailbreak community has a much faster response time...

New GlyphPatch tweak patches recently exposed DoS exploit in iOS

Filippo Bigarella has released a new jailbreak tweak this weekend called GlyphPatch. The utility patches the recently exposed DoS exploit which targets Safari's WebKit engine and causes apps to crash when rendering a malicious sequence of characters.

The bug, which was made public last week, affects users on both iOS and Mac and can be triggered through a few different surfaces: SMS, iMessage, the web, and network SSID. But jailbroken iOS users can protect themselves from it with this new tweak...

iOS 6.1 patches Smart App Banner JavaScript bug

Last month, we reported that a JavaScript bug had been discovered involving Smart App Banners. Apple added the feature in iOS 6 as a way to help developers promote their apps and provide users with a direct link to download them.

Well as it turned out, these Smart Banners were enabling JavaScript in the iOS Settings app without user consent or knowledge. And this was considered to be a fairly serious security threat. But it looks like Apple has fixed it in iOS 6.1...

Patch Released to Let Jailbreakers Stream Live TV from the DirecTV iPad App

In case you didn't know, satellite provider DirecTV recently updated its iPad app with the ability to stream live TV. Customers can stream a selection of channels on the iPad when connected to the same home network as the DirecTV HD DVR.

Like Time Warner, DirecTV has blocked streaming access to users on jailbroken iDevices. A jailbreak patch has been released to fix the block...

Fix iOS 4.3.3 Vulnerability with isslfix

If you may recall, with the release of the long awaited JailbreakMe 3.0 for iOS 4.3.3, literally 10 days later Apple patched the clever PDF exploit in iOS 4.3.4. The security exploit could be triggered by viewing a maliciously crafted PDF file which may lead to an unexpected application termination or arbitrary code execution.

While the main reason Apple patched the exploit was to stop the use of JailbreakMe, it can also be a security concern. A few days later, Apple released another iOS software update, iOS 4.3.5. Apple released this update to patch the certificate validation vulnerability.

If you love customizing your iDevice to the fullest, you've probably already jailbroken, unless you didn't update by accident or purchase your iDevice after Apple stopped signing iOS 4.3.3. Unfortunately, while not updating to the latest software may preserve your jailbreak, you may also be at risk from the same vulnerability...

Germany Issues Warning Concerning Comex’s iOS PDF Exploit

JailbreakMe 3.0 has garnered some serious attention over the last 48 hours. The last report we heard was that the site had been visited over a million times, and the PDF exploit had been downloaded over 500,000 times.

The exploit must have also grabbed the attention of Germany's Information Security team, because the group just issued a country-wide warning for all iOS products. The Mobile Safari vulnerability exposed by Comex in his new jailbreak tool has really made some folks nervous...

PDF Patcher 2 Now in Cydia, Fixes JailbreakMe 3.0 Vulnerability

Now that you are finally able to hack Apple's latest tablet with JailbreakMe 3.0, what's your next move? For starters, you may want to consider closing that hole that Comex's exploit used to break into your iDevice. Think about this:

JailbreakMe 3.0 is extremely easy to use. You simply navigate to a website on your iDevice, and within a few screen taps you're jailbroken. But if Comex can design web software that can gain root-level access to your iDevice so easily, why couldn't someone else?