Apple’s smartphones are notoriously difficult to hack, but this does not mean that they are completely immune to exploits. Few things really are. Recently, a team of researchers from John Hopkins University have detected a vulnerability that allows hackers to intercept and decrypt images and videos sent using iMessage – Apple’s popular instant messaging app. Usually, the exploit should only work on OS versions older than iOS 9, but John Hopkins professor Matthew D. Green has recently stated that hackers could still make use of a modified exploit in order to take over the iOS 9 version of iMessage.
Even though the hacking team in question would need to have considerable resources at its disposal, the hacking method itself is not necessarily too complex, as it relies on a special software that emulates an Apple server. Targeted messages and videos on iMessage are protected only by 64-bit encryption, and the system was not designed to lock out invaders after several failed decryption attempts. Fortunately, Apple is currently working on a fix for this problem, and just in case you rely on iMessage a lot for your daily messaging needs, you should definitely keep an eye out for available updates. Apple has issued the following statement on the matter:
“We appreciate the team of researchers that identified this bug and brought it to our attention … security requires constant dedication and we’re grateful to have a community of developers and researchers who help us stay ahead.”
Electronic Arts (EA) announced today that its games were played for over 11 billion hours…
Steam's annual end-of-year recap, Steam Replay, provides fascinating insights into gamer habits by comparing individual…
GSC GameWorld released a major title update for STALKER 2 this seeking, bringing the game…
Without any formal announcement, Intel appears to have revealed its new Core 200H series processors…
Ubisoft is not having the best of times, but despite recent flops, the company still…
If you haven’t started playing STALKER 2: Heart of Chornobyl yet, now might be the…