Sign up for DML's newsletter

As the most reliable and balanced news aggregation service on the internet, DML News App offers the following information published by Breitbart:

A new report has revealed that iPhones are vulnerable to malware attacks even when they’re turned off.

Wired reports that according to a recent study from researchers at Germany’s Technical University of Darmstadt, iPhone devices are still vulnerable to malware attacks even when powered off. When turning an iPhone off, chips inside the device still run in a low-power state making it possible to locate the lost or stolen device using the Find My app.

The article goes on to state the following:

Now, researchers have developed a method to run malware on iPhones even when the devices appear to be powered off. The Bluetooth chip in all iPhones has no way to digitally sign or encrypt the firmware it runs, researchers have now developed a method to exploit the lack of security on the chip and run malicious firmware allowing the researchers to track the iPhone’s location or run new features.


Researchers state in their paper, “The current LPM implementation on Apple iPhones is opaque and adds new threats. Since LPM support is based on the iPhone’s hardware, it cannot be removed with system updates. Thus, it has a long-lasting effect on the overall iOS security model.”

They added that powering off the iPhone turns it into a tracking device by design, and the implementation within the Bluetooth firmware is not secured against manipulation.

WATCH:

To get more information about this article, please visit Breitbart.

Listen to the latest daily DML podcasts below! Then please share. And if you have the DML NEWS APP, please tell people to download it today and help conservatives have a real voice.

Sign up for DML's newsletter
Previous articleMAJOR DML ANNOUNCEMENT about ‘Truth Social.’ Don’t miss this!
Next articleWATCH: Woman at McDonald’s flips out over wrong order, calls 911, sheriff holds hilarious press briefing

2 COMMENTS

  1. This must be how the 2000 mules were able to be tracked the night of the election proving the election was stolen!

LEAVE A REPLY

Please enter your comment!
Please enter your name here