At Black Hat Europe 2020, approximately two months from now, security researcher @08Tc3wBB and security group ZecOps will discuss an exploit used to jailbreak iOS 13.7. Grab some popcorn and get ready!
You can now watch Apple’s ‘Behind the Scenes of iOS Security’ presentation from this year’s Black Hat Conference in its entirety. A video of the talk, featuring the company’s head of security engineering Ivan Krstic, has been posted to the official Black Hat YouTube page.
Apple’s presence at the conference was a nice change of pace, as the firm typically skips the event. Krstic covered a wide range of topics, including the technologies his team uses in services like HomeKit and iCloud Keychain that handle exceptionally sensitive user data.
If you’ve followed the jailbreak scene for any extended amount of time, you know that it takes a person with high-level skills to exploit iOS. There’s only a handful of people in the world that can do it, and let’s just say they’re very, very talented.
So it shouldn’t come as a surprise that planetbeing—one of the 4 members of the evad3rs—was recognized at this year’s Black Hat hacking convention. He took home the Pwnie for privilege escalation, which was used in the evasi0n jailbreak…
Unlike the malware-infested Android, Apple’s mobile platform is mostly malware-free. Little wonder that Apple prides itself with reviewing apps “to guard against malware” while asserting that other mobile platforms pose a “security risk”.
But what if malicious users could hack your iPhone via a specially built charger – and in less than a minute? That’s exactly what three researchers at the Georgia Institute of Technology claim is possible as they prep to show off a proof-of-concept charger which can be used to invisibly install malware on non-jailbroken iOS devices…