Ride the Lightning

Cybersecurity and Future of Law Practice Blog
by Sharon D. Nelson Esq., President of Sensei Enterprises, Inc.

Tutorial Detailing How to Compromise the iPhone 5s

October 10, 2013

Released less than three weeks ago and with an operating system that has already been patched twice, Apple's iPhone 5s is being called the most vulnerable Apple device ever by experts.

SC Magazine reported Monday that researchers with Berlin-based Security Research Labs (SRL) outlined one way of completely taking over the new Apple phone – placing much of the blame on the Touch ID fingerprint authentication feature and the iOS 7 operating system.

The mobile experts released a video showing how easily a crook can gain access to an iPhone 5s by simply  ripping the new iPhone from someone's hands and running away. The thief will first activate airplane mode by asking Siri or by going to the Control Center, a feature new to iOS 7. This disables the 'Find My iPhone' app which would allow a user to locate a missing device or to wipe it.

From there, the experts take you step-by-step through how to "own" the iPhone 5s. Well worth watching.

More patches, Cupertino?

http://twitter.com/sharonnelsonesq