Players.bio is a large online platform sharing the best live coverage of your favourite sports: Football, Golf, Rugby, Cricket, F1, Boxing, NFL, NBA, plus the latest sports news, transfers & scores. Exclusive interviews, fresh photos and videos, breaking news. Stay tuned to know everything you wish about your favorite stars 24/7. Check our daily updates and make sure you don't miss anything about celebrities' lives.

Contacts

  • Owner: SNOWLAND s.r.o.
  • Registration certificate 06691200
  • 16200, Na okraji 381/41, Veleslavín, 162 00 Praha 6
  • Czech Republic

Your iPhone can be hacked with malware even when it’s switched off, new research finds

It’s possible to load malware onto an iPhone even when it’s turned off, according to a new report.

The study by researchers from the Technical University of Darmstadt in Germany found that a chip that enables Bluetooth can be exploited and hacked in order to instal malware on the device without the user's permission - even though the phone is switched off.

This comes in light of the new iOS 15 update, which includes a feature that allows you to be able to locate an iPhone even when it’s powered off.

Apple has claimed that this new feature will enhance the security of users because it allows them to find a lost or stolen phone, even when turned off.

However, because the chips remain on even when the iPhone is turned off, researchers warn this could pose a new threat.

The feature is enabled because three chips wireless stay on - Bluetooth, Near Field Communication (NFC), and Ultra-wideband (UWB) - the paper noted.

This allows the phone to continue sending signals, and is designed to help the owner find their phone if it's lost.

This is something that the paper calls "Low-Power Mode," which is "different from the energy-saving mode indicated by a yellow battery icon".

The paper - which was released last week and entitled "Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones" - revealed that it was possible to install malware on the Bluetooth chip located in the iPhone.

At this point in time, there is no evidence that this kind of attack has been used yet.

The study also concludes that hackers would need to first hack and jailbreak the iPhone to be able to access and exploit the Bluetooth chip.

At this point in time, there is no evidence that this kind of attack has been used yet. is theoretical, with no proof

Read more on euronews.com