DEFCON: Jailbreaking Apple Watch

On April 24, 2015, Apple propelled themselves into the wearable category with the presentation of Apple Watch. This June, at Apple’s Worldwide Developer Conference, Apple reported that their watch is not just the #1 offering smartwatch worldwide by a wide margin, yet additionally declared the presentation of new capacities that will accompany the arrival of watchOS 4. Like different devices, Apple Watch contains profoundly delicate client information, for example, email and instant messages, contacts, GPS and that’s just the beginning, and like different devices and operating systems, has turned into an objective for malicious activity.

This discussion will give an outline of Apple Watch and watchOS security instruments including codesign enforcement,  sandboxing, memory protection and more. This talk will cover vulnerabilities and misuse subtle elements and jump into the procedures utilized as a part of making an Apple Watch jailbreak. This will at last prompt an exhibition and clarification of jailbreaking an Apple Watch, displaying how it can get to essential client information and applications.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...

How to Identify Company’s Hacked Email Addresses Using Maltego & HaveIbeenPawned

This article is part of the Maltego OSINT tutorial, where you will learn to identify the already hacked account, and it’s password using the...

5 Key Vulnerabilities in Global Payroll

The cyber threat against payroll is growing in sophistication and frequency, according to the latest FBI cybercrime report. Many of these attacks exploit fixable...