Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
FBI Cracks Terrorists iPhone -- Sans Apple
Newest First  |  Oldest First  |  Threaded View
Jeremseo
Jeremseo,
User Rank: Strategist
4/5/2016 | 10:01:57 AM
Easy
Yes, there is no surprise in it
MikeJones87
MikeJones87,
User Rank: Apprentice
4/4/2016 | 5:32:53 AM
Re: iphone
Yeah fix it for 24hrs till the company that makes the product/device to accomplish this task makes there tweak aswell.  Its a constant game really
MikeJones87
MikeJones87,
User Rank: Apprentice
4/4/2016 | 5:29:34 AM
Iphone
For product that is made there is another product made to break that product.  I don't know why its such a big fuss?  It is just a high profile case so the FBI took a unique approach to the situation and the media ate it all up and did the talking for them.  Whats the longest passcode you can make 6 digits? 2 words, Brute Force & Dictionary Attack.  I was gunna offer to help'em but only a fool would truly think the FBI couldnt accomplish that inhouse themselves.
Arda Jeff
Arda Jeff,
User Rank: Apprentice
4/1/2016 | 1:46:19 PM
Re: iphone
Yes, there is no surprise in it. They may simply bypassed the lock screen in iOS. Latest iOS update migh fix this issue
theb0x
theb0x,
User Rank: Ninja
4/1/2016 | 9:24:40 AM
iphone
The iphone's lock screen has consistently been insecure even with any iOS updates. There is no doubt in my mind that it was simply bypassed.
bmurphy458
bmurphy458,
User Rank: Apprentice
3/30/2016 | 1:35:56 PM
Apple Phone
I have said from day 1, hire a white hat hacker, give $5,00 and a case of Mountain Dew and you will have all the data you want off the phone the next morning. I sure hope Apple plugs the leak in their OS.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
3/30/2016 | 8:02:24 AM
Not McAfee?
Well, the third party likely wasn't John McAfee -- else he'd be bragging about it all over the news stations.  ;)
JamesDin
JamesDin,
User Rank: Apprentice
3/30/2016 | 7:11:56 AM
Suspension of Disbelief
To believe that they could not do this from day one is naive at best.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Black Hat USA 2022 Attendee Report
Black Hat attendees are not sleeping well. Between concerns about attacks against cloud services, ransomware, and the growing risks to the global supply chain, these security pros have a lot to be worried about. Read our 2022 report to hear what they're concerned about now.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-1399
PUBLISHED: 2022-08-17
An Argument Injection or Modification vulnerability in the "Change Secret" username field as used in the Discovery component of Device42 CMDB allows a local attacker to run arbitrary code on the appliance with root privileges. This issue affects: Device42 CMDB version 18.01.00 and prior ve...
CVE-2022-1400
PUBLISHED: 2022-08-17
Use of Hard-coded Cryptographic Key vulnerability in the WebReportsApi.dll of Exago Web Reports, as used in the Device42 Asset Management Appliance, allows an attacker to leak session IDs and elevate privileges. This issue affects: Device42 CMDB versions prior to 18.01.00.
CVE-2022-1401
PUBLISHED: 2022-08-17
Improper Access Control vulnerability in the /Exago/WrImageResource.adx route as used in Device42 Asset Management Appliance allows an unauthenticated attacker to read sensitive server files with root permissions. This issue affects: Device42 CMDB versions prior to 18.01.00.
CVE-2022-1410
PUBLISHED: 2022-08-17
OS Command Injection vulnerability in the db_optimize component of Device42 Asset Management Appliance allows an authenticated attacker to execute remote code on the device. This issue affects: Device42 CMDB version 18.01.00 and prior versions.
CVE-2021-42052
PUBLISHED: 2022-08-16
IPESA e-Flow 3.3.6 allows path traversal for reading any file within the web root directory via the lib/js/build/STEResource.res path and the R query parameter.