• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • December 6th, 2019
  • Home
  • About Us
  • Team
  • Advertise
  • Submit News
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Google+
    • Linkedin
    • Youtube
Home » Security » Apple’s iOS 11.4 update may protect devices from phone cracking firms

Apple’s iOS 11.4 update may protect devices from phone cracking firms

May 10th, 2018 Waqas Apple News, iPad, iPhone, Security 0 comments
Apple’s iOS 11.4 update may protect devices from phone cracking firms
Share on FacebookShare on Twitter

Apple is currently testing iOS 11.4 beta update for iPhone and iPad devices. Apparently, the update aims at increasing the security of these devices and protecting them from physical threats. This means that it might become difficult or nearly impossible for the law enforcement agencies and third-party iPhone cracking firms like GrayShift and Cellebrite to crack iPhones and iPads as they claim.

According to Elcomsoft, the iOS 11.4 update is equipped with a new USB Restricted Mode which works in such a way that it in case your phone is locked it will enable a one-week long expiration date upon accessing the Lightning port on your device.

As per the Apple documentation seen by Elcomsoft, “To improve security, for a locked iOS device to communicate with USB accessories you must connect an accessory via a lightning connector to the device while unlocked – or enter your device passcode while connected – at least once a week.”

Since firms like GrayShift use the Lightning port of a targeted Apple device, with this update the task will not be a piece of cake as before. Remember, recently, the US Department of State’s Bureau of Diplomatic Security ordered a GrayShift product which is believed to be GrayKey that costs $15,000 a piece.

Apple's iOS 11.4 update may protect devices from phone cracking firms

GrayShift’s GrayKey (left) and Cellebrite (right)

“At this point, it is still unclear whether the USB port is blocked if the device has not been unlocked with a passcode for 7 consecutive days; if the device has not been unlocked at all (password or biometrics); or if the device has not been unlocked or connected to a trusted USB device or computer,” said Oleg Afonin of Elcomsoft.

“In our test, we were able to confirm the USB lock after the device has been left idle for 7 days. During this period, we have not tried to unlock the device with Touch ID or connect it to a paired USB device. What we do know, however, is that after the 7 days the Lightning port is only good for charging.”

More details on iOS 11.4 update are yet to come while full details regarding GrayShift and Cellebrite’s smartphone cracking capabilities are also unknown. What is known is that according to Reuters, the  San Bernardino suspected shooter’s iPhone was unlocked by Cellebrite.

Once the iOS 11.4 update is issued, one can expect extreme measures from both forms and law enforcement agencies who already oppose Apple’s encryption module.

  • Tags
  • Apple
  • Cellebrite
  • Encryption
  • GrayKey
  • GrayShift
  • hacking
  • internet
  • iPad
  • iPhone
  • security
  • Technology
  • USB
Facebook Twitter Google+ LinkedIn Pinterest
Previous article Google Maps flaw lets hackers redirect users to malicious sites
Next article Man who hacked West Point military academy website arrested from LA
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism.

Related Posts
5 things you should never do when using anonymous operating systems

5 things you should never do when using anonymous operating systems

Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors

Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors

Flawed Implementation of RCS Standard putting data of millions at risk

Flawed Implementation of RCS Standard putting data of millions at risk

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

LATEST POSTS
5 things you should never do when using anonymous operating systems
Security

5 things you should never do when using anonymous operating systems

167
Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns
Surveillance

Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns

3623
Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors
Cyber Attacks

Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors

412
Flawed Implementation of RCS Standard putting data of millions at risk
Security

Flawed Implementation of RCS Standard putting data of millions at risk

539

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us