FBI successfully unlocks San Bernardino shooter’s iPhone

The U.S Dept of Justice has confirmed on Monday that it has dropped the case against the Silicon Valley tech giant Apple Inc. after FBI successfully unlocks the seized iPhone of San Bernardino shooter. The FBI didn’t provided any information about how they bypassed the Apple security and unlocks the iPhone.

After U.S government drop the case – much anticipated showdown between the U.S government and Silicon Valley has been cancelled. The various sources confirmed that FBI seek help from a third party; which played a big part in unlocking the shooter’s iPhone. The name of the third party source will remain confidential according to FBI.

The report FBI filled in court hasn’t disclosed the methods used to unlock the iPhone nor it says that any evidence or lead found related to the San Bernardino attack. A government official accepted; the methods to unlock the iPhone wasn’t developed by the FBI or government agency, but he refuses to comment whether the method can be used to unlock other OS devices.

U.S. Attorney Eileen M. Decker said in an official statement that; “Our decision to conclude the litigation was based solely on the fact that, with the recent assistance of a third party, we are now able to unlock that iPhone without compromising any information on the phone”.

This may have ended the court case but the news have been damaging to Apple Inc. because now FBI have methods to unlock any iPhone the desire. The iOS developers must have their hands on their heads after these latest turn of events.

It will not be surprising if Apple launches a new iOS update in the coming month; which addressees the security issues which FBI have successfully exploited. The issues and methods remains undisclosed which makes it even harder for Apple Inc. to encounter them.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Become an Expert in Ethical Hacking

This article is mainly addressing the audience who wants to pursue their career in Cybersecurity as a professional that provides ethical hacking services, whether...

5 Cybersecurity Tips to Keep in Mind When Working From Home

  Due to the ongoing global health crisis, more and more people are being forced to work from their homes. In fact, Forbes estimates that about...

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...