Apple Lightning cables are used to connect Apple mobile devices like iPhones, iPads, and iPods to host computers, battery chargers and more. Any Mac or Windows computer could be affected, with hackers able to hijack a laptop or PC just by plugging the cable in.When you plug a mobile device into a computer, your iPhone or other device starts charging and a message pops up on your mobile device asking if you trust this computer . However, when Motherboard tested out this cable, a hacker remotely opened a terminal on the Mac s screen and started running commands on their computer.
A hacker has revealed a new way to hijack a computer through innocent looking iPhone cables.Revealed at the cyber security conference DefCon last week, the cables let hackers access your computer and gain entry to online accounts.
There is now a newly developed iPhone lightning charging cable that doesn't just charge smartphones, but also hijacks computers for attackers.According to Motherboard, this modified charger called O.MG Cable has an implant that lets a hacker connect to a computer that the cable is attached to. It's designed by security researcher Mike Grover, also known as MG.
A simple charging cable that you often use to connect your iPhone or Android smartphone with a Mac or Windows machine could be transformed into a hacking tool and help attackers remotely access your PC, a report claims. A hacker who goes by pseudonym MG claims to have developed a Wi Fi assembly implant to make a Lightning cable capable of hacking computers. Dubbed the O.MG cable, it works just like any iPhone data cables and looks almost identical to the official Lightning cable. But the embedded technology can be used to wirelessly control the connected system or transmit malicious payloads using a Wi Fi network.
Windows PCs could be at risk from a major security flaw triggered by one of the platform's most popular software offerings.A leading security researcher has highlighted a vulnerability that would allow hackers to take over control of an entire PC simply by loading some malicious code using Notepad.
One of those reasons, as detailed in a report from Motherboard, is that how there are some cables out there that can actually allow a hacker to breach your computer remotely. The report details how a security reacher calling themselves MG developed a fake Lightning cable which when plugged in, allows hackers to gain access to your computer remotely.To make matters worse, the Lightning cable that MG developed is actually an authentic Lightning cable purchased from Apple, which has then been modified further to allow components to be implanted. It also comes with a script and commands that will allow a hacker to run malicious programs on the victim 's computer.
Apple #x27;s head of security Ivan Krsti said hackers will have a chance at winning the huge payout this autumn a sum that is by far the highest bug bounty on offer from any major tech company.
It;s been called an iPhone jailbreaker;s golden egg: a so called dev fused iPhone created for internal use at Apple in order to extract and study the Secure Enclave Processor (SEP).That golden yolk of a processor handles data encryption on the device that oh so many law enforcement and hacker types spend so much time, respectively, complaining about or cracking for fun, fame and profit.
Check Point discovered three bugs which it claims can be used by hackers to: While the vulnerability and how it can be exploited may sound alarming, what's more concerning is the fact that these vulnerabilities were revealed to WhatsApp a year ago, but remain exploitable even today. RELATED NEWS WhatsApp yet to fix flaws that allow messages manipulation WhatsApp to soon get Instagram's boomerang feature; will let users create loop videos How you can stop people from adding you to family WhatsApp Groups
Android Q s biggest changes so far involve new gesture controls and general UI tweaks, but plenty of other core Android apps and features are also getting upgrades. Here are some of the key differences we noticed in the Google Camera app:
A flaw has been discovered in WhatsApp that could allow hackers to edit users apos; messages essentially putting words in their mouths.
Security experts at Check Point said a hacker could change messages and the sender s identity, essentially putting words in someone s mouth, the FT reported on Thursday (Aug. 7). Facebook acquired WhatsApp in 2014 and was alerted to the security issue in 2018.At the Black Hat cybersecurity conference held earlier this month in Las Vegas, Check Point s head of product vulnerability research Oded Vanunu said Facebook blamed the flaws on limitations that can t be solved due to their structure and architecture. Facebook declined to comment, the FT said.
The intelligence company assesses with high confidence that APT41, a hacking collective, has moved on from financially motivated attacks of video game companies to working alongside the Chinese government. The report was first uncovered by CoinTelegraph.Reportedly, the hacker group targets industries in a manner generally aligned with China 's Five Year economic development plans.
One of the most effective teams of Chinese government backed hackers is also conducting financially motivated side operations, cybersecurity researchers said on Wednesday.US firm FireEye said members of the group it called Advanced Persistent Threat 41 (APT41) penetrated and spied on global tech, communications and healthcare providers for the Chinese government while using ransomware against game companies and attacking cryptocurrency providers for personal profit.
This leak is said to be directly related to a hack that nabbed 7,000 bitcoin last May.On Wednesday, a Telegram group created by an admin under the pseudonym "Guardian M " distributed hundreds of images of individuals holding their IDs and pieces of paper written with "Binance, 02 24 18, " alleging that the data presented was hacked from the exchange. The hacker supplied CoinDesk with hundreds of photographs and we have identified a number of users who recognize the photos of their faces and personal IDs that they sent into Binance for know your customer purposes.
Unfortunately, that was the case for an Ohio woman who contracted a rare infection after her dog licked a slightly infected scratch and she ended up having to have both her legs and hands amputated. In this case, the bacteria from the dog s mouth spread to her body through the open wound and the same thing could happen if a dog, cat or other animal bites or scratches you.
A day after expressing apprehension of a rift with ally Shiv Sena over seat sharing for the upcoming assembly elections, Maharashtra Chief Minister Devendra Fadnavis on Saturday said the Sena and the BJP will contest the polls together. Mr Fadnavis, however, gave a cryptic response when he was asked about his reported remark that he would be "happy" to have Sena leader Aaditya Thackeray as his deputy. "Where have I said it?" he told reporters.