{"id":14825,"date":"2013-06-04T10:50:37","date_gmt":"2013-06-04T17:50:37","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=14825"},"modified":"2016-10-06T12:09:08","modified_gmt":"2016-10-06T19:09:08","slug":"blackhat-brings-news-of-malicious-ios-charger","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/","title":{"rendered":"Blackhat Brings News of Malicious iOS Charger"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneCharger1.png\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-14843\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneCharger1.png\" alt=\"iPhoneCharger1\" width=\"400\" height=\"400\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneCharger1.png 400w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneCharger1-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneCharger1-300x300.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p>Each year, with the start of the BlackHat security conference, thousands of hackers and researchers descend upon the Las Vegas desert. And their arrival is always preceded by spectacular tales of hacking they&#8217;ve done during the previous year. In past years, there has been such spectacular headline fodder as \u201c<a href=\"http:\/\/www.wired.com\/threatlevel\/2010\/07\/atms-jackpotted\/\">ATM Jackpotting<\/a>\u201d and \u201c<a href=\"http:\/\/blogs.computerworld.com\/18744\/black_hat_lethal_hack_and_wireless_attack_on_insulin_pumps_to_kill_people\">Lethal Pacemaker Attacks<\/a>.\u201d This year is no different, as it brings us \u201c<a href=\"http:\/\/www.theregister.co.uk\/2013\/06\/03\/evil_charger_wants_to_destroy_your_iphone\/\">Evil iOS Chargers<\/a>.\u201d<\/p>\n<p>Usually I read these things with an appreciation for the theatrics of it all and just roll my eyes as I move on to the next news story. But since this one pertains to an Apple product, I thought I would take a moment to discuss this tale.<\/p>\n<p>The short of it is, this is nothing to worry about. While the coverage is terribly inflammatory and dramatic, it isn\u2019t something that is now being used (or likely ever will be) in the real world.<\/p>\n<p>The simple fact is, malware authors have plenty of attack surface to cover with Windows, OS X, Linux and Android. They don\u2019t need to get into manufacturing devices and working out how to slip them unnoticed into people\u2019s luggage, to get into these platforms. The information is interesting from an academic perspective, and it\u2019s possible future versions of iOS will address this, but it really isn\u2019t a pressing concern by any stretch of the imagination.<\/p>\n<p><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/sixthlie\/4239536375\/\">Sixth Lie<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Each year, with the start of the BlackHat security conference, thousands of hackers and researchers descend upon the Las Vegas desert. And their arrival is always preceded by spectacular tales of hacking they&#8217;ve done during the previous year. In past years, there has been such spectacular headline fodder as \u201cATM Jackpotting\u201d and \u201cLethal Pacemaker Attacks.\u201d [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":14833,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,5],"tags":[427,431,433],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Each year, with the start of the BlackHat security conference, thousands of hackers and researchers descend upon the Las Vegas desert. And their arrival\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blackhat Brings News of Malicious iOS Charger - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Each year, with the start of the BlackHat security conference, thousands of hackers and researchers descend upon the Las Vegas desert. And their arrival\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-04T17:50:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-06T19:09:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneChargerFT.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneChargerFT.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneChargerFT.png\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/\",\"name\":\"Blackhat Brings News of Malicious iOS Charger - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#primaryimage\"},\"datePublished\":\"2013-06-04T17:50:37+00:00\",\"dateModified\":\"2016-10-06T19:09:08+00:00\",\"description\":\"Each year, with the start of the BlackHat security conference, thousands of hackers and researchers descend upon the Las Vegas desert. And their arrival\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blackhat Brings News of Malicious iOS Charger\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Blackhat Brings News of Malicious iOS Charger\",\"datePublished\":\"2013-06-04T17:50:37+00:00\",\"dateModified\":\"2016-10-06T19:09:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#webpage\"},\"wordCount\":245,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneChargerFT.png\",\"keywords\":[\"BlackHat\",\"iOS charger\",\"Malicious\"],\"articleSection\":[\"Apple\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Each year, with the start of the BlackHat security conference, thousands of hackers and researchers descend upon the Las Vegas desert. And their arrival","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/","og_locale":"en_US","og_type":"article","og_title":"Blackhat Brings News of Malicious iOS Charger - The Mac Security Blog","og_description":"Each year, with the start of the BlackHat security conference, thousands of hackers and researchers descend upon the Las Vegas desert. And their arrival","og_url":"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-06-04T17:50:37+00:00","article_modified_time":"2016-10-06T19:09:08+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneChargerFT.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneChargerFT.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneChargerFT.png","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/","name":"Blackhat Brings News of Malicious iOS Charger - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#primaryimage"},"datePublished":"2013-06-04T17:50:37+00:00","dateModified":"2016-10-06T19:09:08+00:00","description":"Each year, with the start of the BlackHat security conference, thousands of hackers and researchers descend upon the Las Vegas desert. And their arrival","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Blackhat Brings News of Malicious iOS Charger"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Blackhat Brings News of Malicious iOS Charger","datePublished":"2013-06-04T17:50:37+00:00","dateModified":"2016-10-06T19:09:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#webpage"},"wordCount":245,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneChargerFT.png","keywords":["BlackHat","iOS charger","Malicious"],"articleSection":["Apple","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/iPhoneChargerFT.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-3R7","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/14825"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=14825"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/14825\/revisions"}],"predecessor-version":[{"id":57982,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/14825\/revisions\/57982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/14833"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=14825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=14825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=14825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}