Be careful with the cables you connect to your iPhone

And it is that a hacker shows that with one of these fake cables from Apple you can access your computer and that it be controlled from anywhere. This hacker demonstrates how connecting an iPod to the Mac through a cable that seems original at first glance, you can control our equipment remotely, so this could also happen from an iPhone or any device since the problem is the cable.

At first glance we might think that it is an original cable and we cannot differentiate it with the naked eye. One detail that must be taken into account in this case is that if they have managed to do this with an Apple cable, implementing this "hack" in other types of equipment with microUSB C or even USB C cables would be much easier since they do not have any chip that can prevent the smartphone from connecting as it happens with Apple's.

The problem is that it even recognizes the cable as good

What we can deduce from this is that total security does not exist and it is always possible to access our equipment no matter how hard the manufacturers themselves and how careful we are when navigating. So when buying cables to connect to our devices, be careful since in this case even the computer recognizes it as an original Apple cable. The tweet in which this information is published is from MG:

Logically you have to connect this modified cable for this to work, but once connected anyone would have remote access to the device to which it is connected without being able to detect anything out of the ordinary when we connect an Apple cable to our Mac or another computer.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Pablo said

    And where is the moment when you connect the cable? I only see that from his mobile he handles the laptop. If the cables do not have any type of chip, what do they do?