Georgia Institute of Technology’s security research team has conducted a study and their research has shown that Apple iPhone USB system has a security risk. A modified and tweaked iPhone charger in disguise can easily implant malicious software into the phone. The researchers pointed out that the process does not require any user acceptance or interaction with the phone, meaning that malware can be implanted stealthily. All iPhone users are facing this risk. Additionally, the malware can also be completely hidden in the system and that users will not be aware of any of these strange applications.
However, the extent to which how the malicious code can be executed on the iPhone is still unclear. Apple iOS uses a “sandbox mechanism” which will only allow the installation and operation of a signed application software.
The researchers made a special phone charger to test the loopholes in the system. The charger is made based on a credit card sized Linux development board known as the BeagleBoard. This board is still physically quite big, but if hackers find value in it, it will be easy for them to create a rogued iPhone charger.
The researchers will disclose more details of Apple’s security vulnerabilities during Black Hat Security Conference in July. They will also show how this loophole can be covered.
For the LATEST tech updates,
FOLLOW us on our Twitter
LIKE us on our FaceBook
SUBSCRIBE to us on our YouTube Channel!