DEFCON: Jailbreaking Apple Watch

On April 24, 2015, Apple propelled themselves into the wearable category with the presentation of Apple Watch. This June, at Apple’s Worldwide Developer Conference, Apple reported that their watch is not just the #1 offering smartwatch worldwide by a wide margin, yet additionally declared the presentation of new capacities that will accompany the arrival of watchOS 4. Like different devices, Apple Watch contains profoundly delicate client information, for example, email and instant messages, contacts, GPS and that’s just the beginning, and like different devices and operating systems, has turned into an objective for malicious activity.

This discussion will give an outline of Apple Watch and watchOS security instruments including codesign enforcement,  sandboxing, memory protection and more. This talk will cover vulnerabilities and misuse subtle elements and jump into the procedures utilized as a part of making an Apple Watch jailbreak. This will at last prompt an exhibition and clarification of jailbreaking an Apple Watch, displaying how it can get to essential client information and applications.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...