Skip to main content

hacking team

See All Stories

The truth about HackingTeam, jailbreaking and iOS – and how to keep your device safe

Site default logo image

Editors note: Will Strafach (@chronic) runs a mobile security services firm helping enterprises protect their employees and confidential data from mobile threats. Fast and thorough analysis of the compiled binaries found within the HackingTeam dump was possible using their upcoming cloud-based iOS application analysis platform, using highly advanced pattern-matching and heuristic techniques to detect threats and privacy leaks within applications installed on enrolled mobile devices. He can be reached at will@wstraf.me if any readers have further questions or concerns regarding HackingTeam or other iOS malware. 

Written by: Will “Chronic” Strafach

There has been a lot of mixed information and speculation in the media recently in regards to the HackingTeam leak and what it all means for iOS users. Do the surveillance tools the group has reportedly provided to governments and law enforcement present a risk to the average iPhone and iPad user? That’s a question we’ve been getting a lot, so I will attempt to present all of the facts based on the recently leaked documents detailing the HackingTeam’s tools, as well as my opinion on the impact of certain aspects for iOS devices. Advanced users will already be aware of what I am about to state, but for everyone else, here’s what we’re dealing with:

Expand
Expanding
Close

Manage push notifications

notification icon
We would like to show you notifications for the latest news and updates.
notification icon
You are subscribed to notifications
notification icon
We would like to show you notifications for the latest news and updates.
notification icon
You are subscribed to notifications