Apple: Security flaw in iPhone's USB-C port is not a concern
Despite the convenience it brings to users, the USB-C port on the new iPhone also poses security risks. Recently, researcher Thomas Roth discovered several vulnerabilities in the USB-C controller of the iPhone 15 and 16, allowing hackers to access the firmware and execute malicious code. However, Apple said that these attack methods are still complicated and users do not need to worry yet.
Apple: Security flaw in iPhone's USB-C port is not a concern Picture 1
The USB-C port on new iPhones has a security flaw.
Roth demonstrated the technique of "dumping" the firmware of a USB-C controller at the 38th Chaos Communication Congress. This helps hackers analyze source code, find vulnerabilities, and develop malware.
While Apple has not made any moves yet, it is possible that the company will have to update the hardware for future iPhone models such as the iPhone SE 4 and iPhone 17 to patch the security holes.
The move to USB-C on iPhones is partly due to new European Union regulations. However, the standard also brings new security challenges for Apple. In addition, poor quality USB-C cables on the market can also contain hidden hardware circuits that can be used to spread malware or steal data.
However, there are some benefits to dumping your firmware. It helps independent repair professionals better understand your Mac's hardware, making it easier for you to fix your device.
You should read it
- What do you know about the first 'cyber attack' in the world?
- What can organizations do to protect themselves from cyber attacks?
- Detected a security flaw in Lenovo's UEFI firmware, affecting 100 laptop models
- Apple releases iOS 14.4.2, iOS 12.5.2, and watchOS 7.3.3 updates that patch the critical zero-day vulnerability
- UEFI firmware from Microsoft, Intel, HP, Dell etc., can be at risk from nearly 20 different vulnerabilities
- Facebook is a new trend in cyber attacks
- Detecting a Google Drive vulnerability could allow hackers to trick users into installing malware
- The security hole allows hackers to hack iPhone remotely, update iOS now
- iPhone can be attacked through iMessage vulnerability, how does Apple explain?
- 7 Apple hacks, breaches, and security vulnerabilities you didn't know about
- Remote iPhone hack tool via iMessage vulnerability
- Apple announced a new, more diverse level of security bug detection bonus
May be interested
Fake news about QR scanning losing all money after 5 seconds causes panic
Deepfake AI scam wave: Exploiting billionaire Elon Musk
Hackers use AI to commit online fraud: Experts can also fall into the trap
Ransomware turns 35, how terrible was the world's first attack?
HOT Warning: Trick to force employees to become online scammers
New Microsoft 365 Attack Can Break 2FA