Hack

Hackers demonstrate 0-day exploit on iOS 12.1 at recent Tokyo-based Pwn2Own contest

Despite the absurd amounts of time and money that Apple pours into security efforts to make iOS one of the most secure mobile operating systems available today, it seems that even iOS 12.1, the latest publicly-available firmware version on the iPhone and iPad, isn’t entirely hack-proof.

At the recent Pwn2Own contest in Tokyo, Richard Zhu and Amat Cama, a duo of white hat hackers, reportedly harnessed the power of a powerful Safari-based 0-day exploit to recover a photograph that was recently deleted from an iPhone X’s native Photos app.

Pwn20wnd releases re-written Osiris jailbreak for developers and other advanced users

iOS hacker Pwn20wnd was played an instrumental role in various iOS 11-centric projects in recent memory, including the Electra and unc0ver jailbreak tools and the Rollectra un-jailbreaking tool. As of this weekend, however, we can add the Osiris jailbreak tool to that list.

Pwn20wnd released a rewrite of the Osiris jailbreak tool for iOS 11.0-11.4 beta 3 Sunday afternoon. Osiris uses Ian Beer’s tried and true iOS 11 exploits to achieve a jailbreak on the aforementioned firmware versions, but unlike other jailbreak tools available already, it doesn’t install Cydia.

Last chance to downgrade to iOS 12.0.1 for potential jailbreakability

Apple officially released iOS 12.1 to the public last week, and if history is anything to go by, then that means the Cupertino-based tech giant will soon close the gates for downgrades to iOS 12.0.1 via iTunes.

Apple generally closes the signing window for older firmware approximately 14 days after a new version is released, give or take a day. That said, if you’ve been thinking about downgrading back to iOS 12.0.1, then you should probably get a move on.

Possible JailbreakMe-style jailbreak for iOS 4.0-12.0.1 in the works

If you remember the good old days when you could visit a web page in mobile Safari and swipe your finger over a virtual slider to achieve a jailbreak (yes, I’m pointing at you JailbreakMe), then we’ve got some good news for you.

iOS hacker and developer Sem Voigtländer (@UKERN Software) appears to be working on a JailbreakMe-styled tool that you can visit in mobile Safari that theoretically supports iOS firmware versions from 4.0 to 12.0.1 (*with some exceptions*).

If you aren’t already jailbroken, stay on the lowest possible firmware and avoid updates

If you’re already rocking a jailbroken handset by way of Electra or unc0ver, then you should consider yourself lucky. Unfortunately, those who updated to iOS 11.4-11.4.1 or iOS 12.0+, either on purpose or by accident, can’t jailbreak at this time.

If you fall into the latter category and have been crossing your fingers for a jailbreak, then you might be asking yourself whether you should stay where you are or upgrade to iOS 12.1; that’s a question we intend to help you answer in this piece.

KeenLab teases jailbroken iPhone XS Max on iOS 12.1

Every time Apple releases a major new software update for its iOS device lineup, it seems like the talented security researchers over at KeenLab are the first to jailbreak it.

KeenLab was the first to demonstrate a proof-of-concept jailbreak on iOS 12.0 in June and iOS 11.3.1 in April, but now it seems the security firm has found a backdoor into Apple’s iOS 12.1 update, which was only released last week.

How to use Ignition to install the unc0ver jailbreak without a computer

Pwn20wnd’s unc0ver jailbreak tool has been receiving lots of updates lately, and if you’re like me, then you’re not always at a computer to download them. Fortunately, a handy online tool called Ignition can help you sidestep Cydia Impactor when you’re nowhere near your computer.

In this tutorial, we’ll walk you through how to use the online Ignition utility to install the unc0ver jailbreak on your iOS 11.0-12.4.1 iPhone or iPad [up to A12(X)] without a computer.

As promised, Ian Beer publicizes iOS 11.4-11.4.1-centric exploits

Matrix code hacked iPhone.

About a month ago, renowned security researcher Ian Beer announced plans to publicly release iOS 11.4-11.4.1-centric exploits as hacking focus shifted over to Apple’s newer iOS 12 release. It’s been near-radio silence since then, but as of today, those exploits are officially public.

As it would seem, Beer’s latest batch of iOS security exploits encompass the following:

Unc0ver RC8 released with refined code, fix for snapshot errors, and more

It was just yesterday that iOS hacker Pwn20wnd released unc0ver RC7 with essential bug fixes and improvements encompassing the RootFS Restore on iOS 11.2-11.2.6 and the MP exploit clean-up method, but as of Thursday afternoon, he’s at it again.

Pwn20wnd has just released unc0ver RC8 with a slew of other critical bug fixes and improvements, and all users are advised to download and run the latest version when they can.