• POLITICS
  • SCIENCE
    • Astronomy
    • Physics
    • Biology
    • Geology
    • Environment
    • Medicine and Health
    • Sociology
    • Psychology
  • MOVIES & TV SHOWS
  • TECHNOLOGY
    • Artificial Intelligence
    • Virtual Reality
    • Bionics
    • Nanotechnology
    • Engineering
    • Robotics
    • Space Exploration
    • Transport
    • Industry and Service
  • GADGETS
    • Mobile Devices
    • Wearables
    • Consoles
    • Hi-Tech
  • GEEK CULTURE
    • Gaming
    • Comics
    • Thingamajigs
  • MUSIC
  • SOFTWARE
    • APPS
      • Android
      • iOS
      • Windows
  • HARDWARE
  • CARS
  • REVIEWS
  • Advertise
  • Geek Reply Jobs
  • Contact Us
Geek Reply
  • HOME
  • Editorials
  • Geek Squad
  • GeekReply Jobs
  • Contact Us
  • Facebook

  • Twitter

  • Google+

  • LinkedIn

  • RSS

Apps

What is Trustjacking? The iOS Exploit that Allows for Remote Control

What is Trustjacking? The iOS Exploit that Allows for Remote Control
blank
Ule Lopez
April 19, 2018

Hoo boy, a new vulnerability has come up for iPhone users everywhere. In today’s day and age where the biggest concern is privacy, we shouldn’t take any sort of vulnerability that can result in other users taking control of our devices lightly. As such, we’re going to take a few moments to explain what’s the latest iOS vulnerability, TrustJacking.

iTunes Wi-Fi Sync is all that’s needed in order to allow any malicious actors to gain control over iOS devices. It also allows them to record and control any and all sort of activities remotely. And yes, this is a problem that has been spreading on mobile phones before, not even Android users were safe from this.

Despite the fact that iTunes Wi-Fi Sync is pretty useful for many iOS users considering the fact it allows them to sync the devices without the need of cables. There are also other features that Wi-Fi Sync offers such as access the photos on the device, perform backups, and install apps. However, the iOS device user never gets notified about this on their phone.

This is what happens when a malicious actor wants to make their move. Once the victim and the attackers are connected to the same network, a vague prompt asking whether or not to trust the computer pops up. If the victim allows this computer to be trusted, they are pretty much allowing the malefactor to record activity without the victim knowing.

Not to mention, even if you have disconnected the device from the malicious computer. The user can enable the iTunes Wi-Fi Sync feature, regardless of whether or not the victim authorizes it. Basically, once the user chooses to trust the malicious computer. They can get any and all sort of access to the affected party’s iPhone device, gathering data from them or even installing virus apps.

Apple sort-of-but-didn’t address this issue by adding a mechanism that ensures the real owner of the iOS device chooses whether or not to trust this computer. However, there isn’t a way to choose to “Untrust” previously selected computers and the prompt is still vague so this really isn’t a solution more like a bandaid.

The best way to ensure that no unwanted computers are being trusted by your iOS device is to clean the trusted computers list by going to Settings > General > Reset > Reset Location & Privacy. Afterwards any and all affected users can pretty much start from scratch and cautiously re-authorize other computers for data access to their iOS device.

This exploit was discovered by Symantec and they are working hard to keep users informed about Trustjacking in iOS devices. I’d suggest you take a full read at their article which explains the situation in more depth. I also would recommend to refrain from using iTunes Wi-Fi Sync for the time being until it’s better implemented by Apple.

Post Views: 612
W3Schools
Related ItemsCybersecurityExploitfeaturediOSiOS DevicesiPhone XiTunesiTunes Wi-Fi Sync
Apps
April 19, 2018
blank
Ule Lopez @UleTheVee

I always wanted to be a journalist who listens. The Voice of the Unspoken and someone heavily involved in the gaming community. From playing as a leader of a competitive multi-branch team to organizing tournaments for the competitive scene to being involved in a lot of gaming communities. I want to keep moving forward as a journalist.

Related ItemsCybersecurityExploitfeaturediOSiOS DevicesiPhone XiTunesiTunes Wi-Fi Sync

More in Apps

blank

A watchdog organization paid $15,000 to quickly decipher the passwords of a federal institution

Zach RileyJanuary 11, 2023
Read More
blank

Google appeared as a car manufacturer

Zach RileyJanuary 6, 2023
Read More
blank

Apple Mini-LED Display Supplier Reports Decreasing Demand As Rumors Suggest a Switch to OLED in the Next Few Years

Zach RileyDecember 29, 2022
Read More
blank

Apple Provides 10 Practical iPhone Tricks

Zach RileyDecember 29, 2022
Read More
blank

Republican lawmakers and Apple CEO Tim Cook meet in Washington

Zach RileyNovember 30, 2022
Read More
blank

Anyone willing to pay can now access the Tesla FSD driver assistance beta

Zach RileyNovember 25, 2022
Read More
blank

Angry demonstrations start at a major iPhone factory in China

Zach RileyNovember 23, 2022
Read More
blank

WhatsApp’s new Communities feature aims to bring related group chats together

Zach RileyNovember 3, 2022
Read More
blank

15 top Android music player applications

Zach RileyOctober 27, 2022
Read More
Scroll for more
Tap
  • Popular

  • Latest

  • Comments

  • blank
    Orlando Bloom and David Harbour Share the Gran Turismo movie’s first trailer
    GamingJanuary 5, 2023
  • blank
    The highlight of the PSVR2 demo at CES was Horizon Call of the Mountain
    GamingJanuary 5, 2023
  • blank
    For Years, Sony Has Been Developing an Accessibility Controller for the PS5
    GamingJanuary 5, 2023
  • blank
    Remake of Silent Hill 2 Dev is “Very Safe” with Any Changes
    GadgetsJanuary 5, 2023
  • blank
    iPhone 14 – 10 LEAKED Features!
    GadgetsJanuary 20, 2022
  • Stellar Data Recovery Professional for Mac
    Stellar Data Recovery Professional for Mac- It can surely save the day
    ReviewsSeptember 26, 2019
  • blank
    PS5 in its Actual Size Seen Being Installed in Dubai
    ConsolesFebruary 1, 2023
  • blank
    According to a Digital Foundry Analysis, Dead Space PS5 is the “best-in-class” game
    ConsolesFebruary 1, 2023
  • blank
    Steel Seed, a stealth action game, has a moody PS5 announcement trailer
    GamingFebruary 1, 2023
  • blank
    On the first anniversary, Dying Light 2 Support is Detailed and the Dying Light Series Ships 30 Million
    ConsolesFebruary 1, 2023
  • blank
    Ule || TSR says:

    That is far from the intention in this article. Especially…

  • blank
    Romuska Palo Ur Laputa says:

    Most of the characters became unlikable and regressed backwards, the…

  • blank
    reversalmushroom says:

    Lauren Faust has not been part of My Little Pony…

  • blank
    reversalmushroom says:

    Like what?

Geek Reply

Greetings techies! We are Geek Reply, a website whose main goal is to bring you all the latest news and updates from within the industry and beyond. What can you expect to find here?

Professional journalism coupled with expository writing for the most part, but we also give our honest opinion or throw in a pinch of humor for good measure when we deem it necessary. Our team is comprised of enthusiasts from across a wide variety of fields ranging from smartphone junkies to camera nerds, and everything in between. But perhaps you were looking for your daily dose of science news or hoping to read about the latest apps. If that’s the case, don’t worry, you came to the right place.

GeekReply Secured with GeekReply Scured
Nintendo Switch GeekReply

Copyright © 2022 GeekReply - Webdesign & Marketing - iPublicitate

Some Telegram Users Use the App for Movie Pirating
Apple Releases macOS 10.13.4 Security Update – Download Live