Have you ever been scared of… charging your iPhone?! think twice.

Jun 06, 2013 By carolineb

A way to hack into an iPhone only through charging the phone! Georgia Institute of Technology researchers figured out how to attack iPhone with malicious software through a charging cord.

The proof of concept will be presented by the institute at Black Hat USA 2013– giving you another good reason to come to the conference (visiting the Checkmarx booth).

Although Apple iOS devices are considered to be extremely secured, this experiment proved that it is easy to threat the security of one’s phone.  This article introduces a detailed explanation of how to hack a phone with a charger and more importantly, how Apple can prevent this from happening.

Go to source.

The following two tabs change content below.


Latest posts by carolineb (see all)

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Get a Checkmarx Free Demo Now

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.