📅 November 21, 2016

What Could a Hacker Actually Get from Your iPhone?

What Could a Hacker Actually Get from Your iPhone?

We hear about hackers often on the news and see them in movies and TV nearly every day, but what we see in the media is a misrepresentation of the truth.

Hackers do go after huge organizations, yes, but the far more common target is someone just like yourself and the device you carry. To hackers, your iPhone is far more valuable than your wallet and far more useful in the long term.

Unfortunately, despite Apple’s best efforts, your iPhone’s safety cannot be guaranteed without your effort and caution. Yet what makes a hack so dangerous for you? What could a hacker do with the information on your iPhone? What exactly can you do to protect yourself?

Let’s answer those questions by reviewing the most important information on your iPhone.

Continue reading “What Could a Hacker Actually Get from Your iPhone?”

📅 April 7, 2009

iPhone Forensics Demonstration



In this webcast, Jonathan A. Zdziarski, author of iPhone Open Application Development, demonstrates how to install his custom forensics toolkit on any existing model iPhone and send a raw disk image to a desktop machine. He also shows you how to recover files specific to the iPhone including deleted keyboard caches, photos, web objects, and much more.