The 16-year-old boy hacked the Apple server, stealing 90GB of data
The 16-year-old student from a private high school in Melbourne, Australia hacked Apple's server for more than a year and is facing charges after Apple reported to the FBI about the incident.
The Age reported that the Australian student from Melbourne had hacked Apple's server from his home, saying he was a fan of the Apple and thought he was doing a good thing.
During that time, he had downloaded 90GB of security data, including authentication keys to grant access to users who were heavily protected and had access to multiple user accounts.
Last year, he was discovered by the Australian police (AFP) after a house search, but everything was kept secret but now he is known to many people in the world hacker community.
'Two Apple laptops were confiscated, in which the serial number coincided with the serial number of the devices that were accessed on the system,' the inspector said.'Mobile phones and hard drives are also confiscated with IP addresses that match those who broke into the Apple system.'
The student said the motive was because 'dream' was made at Apple
When searching this schoolboy's home in Melbourne, Australian police discovered many files and hacking software that helped him break into many Apple servers many times, all stored in a normal folder Encrypted clown named 'hacky hack hack'.
He later shared it on WhatsApp but eventually Apple security team discovered him on their server and blocked it.The boy told police that he hacked Apple because he wanted to work at this technology giant.
At the time of writing, Apple did not say what important 90GB files it contained as well as the accounts of the users who were accessed.The 16-year-old is still waiting for the verdict to be released next month.
See more:
- Apple officially became a company of 1000 billion dollars
- The 7-year dispute over the iPhone patent between Apple and Samsung also came to an end
- 49 most asked questions that Apple asked in the job interview
You should read it
- How to download data from Apple ID to computer
- What is hardware hacking? Is it worrisome?
- Enigma is hacked, more than $ 470,000 Ethereum is stolen
- Basic hacking techniques - Attendance - Part III
- Apple added a series of new applications to Apple TV
- How to back up data on Apple Watch
- Visit the 8 most majestic stores in the world of Apple
- Fix Apple ID error disabled
May be interested
- New error detection in 4G LTE protocolscientists from purdue and iowa university have discovered new vulnerabilities in the main protocol of the 4g lte mobile network - currently very popular in the world.
- The new Specter vulnerability appears to be a new variant that easily 'crashes' secure partitions created by Intel SGXresearchers from the ohio state university have discovered a new dangerous variant of the specter vulnerability called sgxpectre with the ability to exploit information from safe partitions created by intel sgx.
- Bkav released a free detection tool for Meltdown and Specterbkav has released a free tool that checks whether the browser and the user's computer are also suffering from specter and meldown errors.
- It turns out this is how hackers attack your computer through the main screenthe video clearly shows how he entered the user's computer through the main screen, creating a vulnerability on the computer to steal personal information. in this way, the hacker can even change the amount of money in the user's bank account.
- Windows 10 vulnerability from Cortana helps hackers open unauthorized malicious websites and how to fix themby default, cortana will always listen to users' requests, even if the lock screen on windows 10, this is the hole that gives hackers the opportunity to manipulate the device and install malicious code. in computer.
- Hackers can use Ransomware to attack and control robotsioactive, an american security consulting firm, recently launched an attack to prove that hackers can not only use ransomware to attack computers to make ransom, but also attack complex robot systems. are being used in many areas.