iPhone USB-C Vulnerability Revealed, iMessage Scam Tactics Exploited
A complex USB-C controller hack poses minimal real-world risk, while scammers find new ways to bypass iMessage protections.
- Security researcher Thomas Roth demonstrated a vulnerability in Apple's ACE3 USB-C controller, used in iPhone 15 and 16 models, through advanced hardware techniques like electromagnetic fault injection.
- While the USB-C hack could theoretically allow attackers to take control of an iPhone, it requires physical access and is considered too complex to pose a significant real-world threat.
- Apple and Roth agree that the USB-C vulnerability is not a practical concern, though it lays groundwork for further research into potential security flaws.
- iMessage scammers are exploiting a loophole by tricking users into replying to messages, which disables Apple's built-in link-blocking protections for unknown senders.
- Experts recommend avoiding public USB ports, using personal charging equipment, and refraining from replying to unsolicited messages to minimize security risks.