Be careful with the Lightning cables that you connect to your Mac

And it seems that even with the original Apple cables we are safe in our equipment. A hacker discovers how to access our Mac in the easiest way from anywhere in the world thanks to the hack of an original cable from the Cupertino company.

It is true that Apple cables are the safest that there is today thanks to the chip incorporated in them, but even this is possible to hack and therefore access our Mac. Also in the tests carried out by this hacker you can see clearly how you access it thanks to the connection of an iPod and the equipment recognizes the cable as it originates, so You will not even realize that they will already be in your team ...

In this way, any user with the necessary skills (which are not few and this cable) could remotely access our equipment. In short, it is something that people like you or like me since it is honestly complicated that it really affects us, but surely some companies may have problems of some kind because of this security hole that Apple may end up closing soon.

The tweet in which you can see this cable and the possibility of accessing it remotely is this:

At Lóleo Eventos, Website Vice was the site chosen by the author of this hack to publish the news. Nowadays there is nothing 100% sure as this news shows, in addition if this was implemented in Apple cables that are the safest in terms of data transfer between computers thanks to these chips, the rest of the cables would be even easier to hack. 


Buy a domain
You are interested in:
The secrets to launching your website successfully

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.