Jonathan Zdziarski Stories April 6, 2017

It was a surprise to the Mac community when Apple hired security researcher Jonathan Zdziarski last month, and many wondered what might happen to his app Little Flocker. Now TechCrunch reports that the security utility for the Mac will have a new home…

expand full story

Jonathan Zdziarski Stories March 14, 2017

Apple has hired Jonathan Zdziarski, a forensics consult and security researcher who has been heavily involved in the iOS security community. Zdziarski was notably vocal during Apple’s conflict with the FBI last year, offering his technical expertise against claims being made by the government.

expand full story

Sylvania HomeKit Light Strip

Jonathan Zdziarski Stories September 3, 2014

A forensics consult and security researcher who analyzed metadata from leaked photos of Kate Upton said that the photos appear to have been obtained using software intended for use by law enforcement officials, reports Wired. The software, Elcomsoft Phone Password Breaker (EPPB), allows users to download a complete backup of all data on an iPhone once the iCloud ID and password have been obtained.

If a hacker can obtain a user’s iCloud username and password with iBrute, he or she can log in to the victim’s iCloud.com account to steal photos. But if attackers instead impersonate the user’s device with Elcomsoft’s tool, the desktop application allows them to download the entire iPhone or iPad backup as a single folder, says Jonathan Zdziarski, a forensics consult and security researcher. That gives the intruders access to far more data, he says, including videos, application data, contacts, and text messages …

expand full story

Jonathan Zdziarski Stories July 21, 2014

Apple responds to iOS backdoor access claims, denies its existence

Over the weekend, iOS security hacker Jonathan Zdziarski released a presentation claiming to show how Apple had purposefully made backdoor access points for a variety of system and user data on iOS devices, that would usually be locked and encrypted via the passcode. The legitimacy of the claims is still questionable.

Powered by WordPress.com VIP