Particle.news

Download on the App Store

iPhone USB-C Vulnerability Revealed, iMessage Scam Tactics Exploited

A complex USB-C controller hack poses minimal real-world risk, while scammers find new ways to bypass iMessage protections.

  • Security researcher Thomas Roth demonstrated a vulnerability in Apple's ACE3 USB-C controller, used in iPhone 15 and 16 models, through advanced hardware techniques like electromagnetic fault injection.
  • While the USB-C hack could theoretically allow attackers to take control of an iPhone, it requires physical access and is considered too complex to pose a significant real-world threat.
  • Apple and Roth agree that the USB-C vulnerability is not a practical concern, though it lays groundwork for further research into potential security flaws.
  • iMessage scammers are exploiting a loophole by tricking users into replying to messages, which disables Apple's built-in link-blocking protections for unknown senders.
  • Experts recommend avoiding public USB ports, using personal charging equipment, and refraining from replying to unsolicited messages to minimize security risks.
Hero image