Connect with us
Vulnerability in Apple iCloud Threatens Billion Users Vulnerability in Apple iCloud Threatens Billion Users

Security

Vulnerability in Apple iCloud Threatens Billion Users

Published

on

Private messages in iMessage and WhatsApp on iPhone are not secure when using the factory settings.

More than a billion iPhone owners are at risk if they don’t change their iCloud settings soon.

As Forbes reports, private messages sent via iMessage and WhatsApp on iPhone are not secure when using factory settings.

While encrypted apps like iMessage and WhatsApp keep your messages on your device completely safe, a vulnerability in Apple’s iCloud backup system puts it at risk – unauthorized people can access your messages.

This is because Apple stores message encryption keys in iCloud backups, which undermines the main security features that protect iMessage.

Apple states in its security policies: “End-to-end encryption protects iMessage conversations on all your devices, so Apple cannot read your messages as they travel between devices.”

This means that while messages are fully secured in transit between phones, they don’t have to be secured on the device or in the cloud.

Apple has come under a lot of pressure recently after an internal FBI document was released proving that the bureau regularly accesses messages on nine secure messengers, including iMessage and WhatsApp.

“If the target is using an iPhone and iCloud backup is enabled, the data returned by iCloud may contain WhatsApp data to include the content of the message,” the FBI document says.

To keep their messages safe, users can turn off iCloud backups.

Click to comment

Leave a Reply

Your email address will not be published.

Phones

It turned out that even a turned off iPhone can be hacked

Published

on

It turned out that even a turned off iPhone can

Researchers at the Technical University of Darmstadt in Germany have found that the iPhone can be at risk even when turned off.

When iPhone is turned off, most wireless chips, including Bluetooth, NFC, and Ultra-Wideband (UWB), continue to work for up to 24 hours. So the phone can still be found through Find My and you can still access credit cards and digital keys. These wireless chips have direct access to the secure element and can be used to install malware on the iPhone even when iOS is down.

Wireless chips operate in low power mode (Low-Power Mode, LPM). This is not to be confused with Power Saving Mode, which extends battery life. LPM support is implemented in hardware, which means that this issue cannot be fixed with a software-side fix.

It turned out that even a turned off iPhone can be hacked

Researchers conducted a security analysis of the LPM features introduced in iOS 15 and found that the Bluetooth LPM firmware could be modified to run malware on the iPhone. These loopholes have not been previously considered and could allow hackers with system-level access to track someone’s location or trigger new features on the phone. The problem seems to stem from the fact that LPM features were designed with functionality in mind, and there seemed to be little attention given to possible threats outside of the intended applications.

Disabling Find My turns turned off iPhones into tracking devices, and the implementation in the Bluetooth firmware is not immune to manipulation. Tracking properties can be surreptitiously modified by attackers with system-level access.

Ars Technica notes that most iPhone users have nothing to worry about, since a jailbroken iPhone is required to infect third-party software. However, the security hole can be exploited by spyware such as Pegasus.

The results of the research were transferred to Apple, which did not comment on the situation.

Continue Reading

Components

The GeForce RTX 3050 can now also be almost fully used for Ethereum mining. Nvidia LHR v3 security cracked 90%

Published

on

The GeForce RTX 3050 can now also be almost fully

A couple of weeks ago, the LHR protection in Nvidia graphics cards was cracked, which allowed everyone to use accelerators for Ethereum mining at full capacity again. But in fact, then the protection of LHR v2 was cracked, but not LHR v3.

The GeForce RTX 3050 can now also be almost fully used for Ethereum mining.  Nvidia LHR v3 security cracked 90%

The LHR v3 version is present in Nvidia’s latest releases: RTX 3050 and RTX 3080 12GB. And it is still not completely hacked, but now the NiceHash miner is able to use 90% of the performance of these cards when mining cryptocurrency. It’s not a complete hack yet, but it’s getting very close.

Fortunately, at the moment the cryptocurrency market is in a state of decline, so it hardly makes any sense to buy the same RTX 3050 for mining, which means that gamers need not worry for now.

By the way, a large article has been published on our website with an analysis of methods for cracking Nvidia protection.

Continue Reading

Security

Nvidia lost. LHR mining protection is also hacked under Linux. This was done by NBMiner developers

Published

on

Nvidia lost LHR mining protection is also hacked under

Two days have passed since the NiceHash developers cracked the Nvidia LHR protection, as the NBMiner team also pleased their users with the same news. Only this time we are talking about software for Linux.

Nvidia lost.  LHR mining protection is also hacked under Linux.  This was done by NBMiner developers

Thus, Nvidia’s protection completely fell for both Windows and Linux. Unfortunately, both programs are closed source, so it’s not clear what mechanisms the developers used to hack.

Whether the loss of Nvidia will affect the availability and prices of video cards is still difficult to say. At the moment, the cryptocurrency market continues to fall, but sooner or later it will turn around, and gamers may again face shortages and overpriced graphics cards.

Continue Reading

Most Popular