Hackers claim to revive 'bricked' iPhones
Commercial iPhoneSIMFree touts success, open-source Dev Team says it's close
Computerworld - Hackers have come up with at least one way to "unbrick" iPhones disabled by a firmware update Apple Inc. issued two weeks ago, developers of both paid and free unlock software said today.
The iPhoneSIMFree, a commercial venture that was the first to publish a point-and-click unlock hack last month, has announced Version 1.6 of its software, and claimed that it could bring any bricked iPhone back to life. The iPhoneSIMFree hack is sold through a network of online resellers for between $60 and $99. "SimFree v1.6 release is now capable of completely restoring/repairing software unlocked 'bricked' iPhone[s]," promised the site run by an unknown number of unnamed hackers.
However, another unlock hacking group, the iPhone Dev Team, urged owners of bricked iPhones to sit tight. "Free unlock of 1.1.1 is coming soon," said someone identified as netkas on the Hackint0sh message forum this morning. Hackint0sh is where the Dev Team posts official and unofficial updates to users of its free open-source unlock hack. "Don't know right now about bricked iPhones, but I guess we can reflash them now and back to working state. So, wait a bit and don't use ipsf [iPhoneSIMFree]," netkas added.
The iPhone Dev Team and iPhoneSIMFree have been working feverishly since Sept. 27, when Apple released the 1.1.1 firmware update, to restore bricked iPhones to working condition. Dev Team has also been trying to recover the ability to modify the device with third-party applications.
It's unclear, however, how permanent any "unbrick" fix will be, or whether changes to the hacks that allow modifications will survive the next iPhone update from Apple.
Read more about Macintosh in Computerworld's Macintosh Topic Center.
- Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are...
- Magic Quadrant for Data Masking Technology IBM is a leader in Gartner Inc's Magic Quadrant for Data Masking Technology. Read the full report to learn about IBM.
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer... All Macintosh White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!