"Researchers Break Apple's New MacBook Pro Weeks After Release"

A Georgia Tech researcher successfully bypassed security measures on Apple's latest MacBook Pro equipped with the M3 processor chip in order to get his fictitious target's Facebook password and second-factor authentication text. Jason Kim, a Ph.D. student, demonstrated how the recently discovered iLeakage side-channel exploit remains a genuine threat to Apple devices, regardless of how updated their software is. The vulnerability, which was discovered by Kim and Daniel Genkin, an associate professor in the School of Cybersecurity and Privacy, affects all recent iPhones, iPads, laptops, and desktops made by Apple since 2020. Attackers can use iLeakage to see what is occurring in their target's Safari browser. As Kim demonstrated on a slightly older MacBook Pro, this vulnerability allows potential access to Instagram login credentials, Gmail inboxes, and YouTube watch histories. This article continues to discuss the iLeakage study.

Georgia Tech reports "Researchers Break Apple's New MacBook Pro Weeks After Release"

Submitted by grigby1

Submitted by grigby1 CPVI on