iPhone Hacking

How to add Qi wireless charging to your iPhone

Nillkin Magic Tag

The year 2017 was the year of Qi wireless charging for Apple devices. Much of the buzz surrounding the iPhone 8 and iPhone X revolves around the additions of a built-in charging receiver and glass back. While the simplest way to get Qi charging is to upgrade, iPhone owners may not want to spend the money. Luckily, for those with earlier model iPhones there is a cheap way to try wireless charging with your existing iPhone.

Where is the du command on my iPhone / iOS?

The du command, used to look up disk usage statistics, is not installed on iOS by default. This utility can help track down the location of large files when using SSH to explore the filesystem of a jailbroken iPhone.

Luckily, a package of GNU utilities can be installed via Cydia. Once the Core Utilities package is downloaded and installed, du will be executable from the iOS command line.

iOS 7 Fixes Malicious Charger Hack

A group of researchers has demonstrated how to compromise an iOS device with a malicious charger at this year's Black Hat convention in Las Vegas. The malware injection is effortless and hides itself in the same way that Apple hides stock apps. According to Reuters, there is no need to worry since the threat will be neutralized by Apple in iOS 7.

Apple USB charger fix

Spokesman Tom Neumayr said the problem was fixed in the upcoming release of iOS 7 and Apple "would like to thank the researchers for their valuable input." The update will warn users with a pop up message whenever the iOS device is connected to a computer. This is important, because in the demo an innocent-looking USB charger was actually a small linux computer in disguise, loaded with malware.

Don't Plug Your iOS Device Into This Charger

Ever borrowed an iPhone USB charger from a stranger? Watch out. Now a Georgia Institute of Technology research team has proven that a specially designed charger can inject malware into your iOS device effortlessly in under a minute. At least that's the result of their research to create a proof-of-concept malicious accessory, to be fully revealed at the Black Hat security conference this July.

Apple USB charger hack

The research abstract briefly describes "how USB capabilities can be leveraged to bypass [USB] defense mechanisms." Not only this, but the malware is disguised once installed to hide itself "in the same way Apple hides its own built-in applications." In case you were wondering, the experiment was performed with the latest and greatest version of iOS.

Pages

Subscribe to RSS - iPhone Hacking