• The Real Story Behind The iPad 2 Jailbreak Leak


    Most of you know by now that Comex’s long-awaited iPad 2 jailbreak was leaked. As the hacker was putting the finishing touches on JailbreakMe 3.0, the PDF exploit was leaked to the world. Someone publicly posted the new JailbreakMe files, and the links spread around the web like wildfire.

    The original dramatic story heard was that a trusted beta tester leaked the files. That would have meant Comex was betrayed by someone he trusted, adding insult to injury. but according to iDB this is not what actually happened. Here’s the real story behind the iPad 2 jailbreak leak…

    20 year-old Ryan Lobbins is a computer science major from Arizona. Lobbins took to his blog yesterday to clear the air regarding his part in the leak of Comex’s exploit.

    “Am I responsible for the leak? Indirectly, yes. Did I leak it intentionally? Not really, I only intended for 1 or 2 people to try the files to see if they worked. The person who leaked it was Will Sayer, and him only. He released the files, sent off the info to news sites not me.”

    As it turns out, Lobbins isn’t a beta tester and never said that he was. The entire story seems to have been cooked up by the same person who posted the original links to the unfinished jailbreak.

    “I was playing Star Craft with some friends reading Comex’s Twitter updates like every other person waiting for the jailbreak. This is when I had a crazy idea just to search a site he posted in a previous tweet.”

    During his search, Lobbins came across Comex’s bannerbomb exploit for the Nintendo Wii which led him to believe this was Comex’s site. As he continued to pour through the directories, he came across a folder named saffron that grabbed his attention. Low and behold, it was Comex’s new JailbreakMe.

    “So what would you do if you stumbled on a website that had all the data for the jailbreak people have been waiting months for? At first I wasn’t sure what to do, let alone believe I found the files. The only true indication that I found them was all the pdf files, deb files named after different iOS devices, and a php file.”

    When Lobbins went to try the jailbreak on his iPad, it didn’t work. So the computer science major made copies of the files to try on other devices. He then uploaded the files to his personal site before going on vacation.

    The night of July 1st, while on holiday, Ryan’s curiosity got the better of him. Here he had Comex’s new jailbreak software, which didn’t work on his iPad. He wondered if it worked at all. He got in touch with someone he had met through an iDevice forum named MultimediaWill, and sent him a link to one of the uploaded PDF files.

    To his surprise, it worked. It quickly did jailbreak his iPad and installed the all-too-familiar Cydia icon. According to Lobbins, Will swore up and down he wouldn’t leak the files. But judging by the mayhem that ensued yesterday morning, he was lying.

    So there you have it, that’s how the infamous iPad 2 jailbreak leak unfolded. By now, most of the links to the leaked files have been removed, and the community is still holding vigilant for the real iPad 2 jailbreak.

  • Apple’s iOS Is More Secure Than Google’s Android!


    An interesting report run by security experts at Symantec indicates that Apple iOS devices are much “less prone” to most security risks than Google’s Android platform.

    For its closed app distribution nature, the iOS is more secure and its increased resistance to resource abuse, data loss, and data integrity attacks among the factors.

    In a head-to-head comparison, Symantec found that iOS was just more secure in many areas, and was found, contrary to their findings regarding Android, to have full protection against malware attacks. Apple’s platform was also found to have greater security feature implementation in the categories of access control, application provenance, and encryption.

    The report also applauds Apple for their thorough and excellent job in designing the non-interface aspects of iOS. Check out the full report in all of its detail over at Symantec.

    [via mactrast]

  • LulzSec Could Have Hit Apple Servers


    WSJ is reporting that the AntiSec hackers known as LulzSec that have been horsing around the internet using SQL injectors to steal username and password have hit Apple’s servers and taken usernames and passwords.

    The hackers said in a statement posted to Twitter that they had accessed Apple’s systems due to a security flaw used in software used by the Cupertino, Calif.-based gadget maker and other companies. “But don’t worry,” the hackers said, “we are busy elsewhere.” A spokesman for Apple didn’t immediately respond to a request for comment. The posted information comes as part of a two-month campaign of digital heists targeting corporations including Sony Corp. and AT&T Inc., as well as government agencies such as the U.S. Senate, the Central Intelligence Agency and the Arizona Department of Public Safety.

    However in a Previous postings by the group, titled “LulzSec into the iCloud,” they have claimed a much bigger bounty:

    Some weeks ago, we smashed into the iCloud with our heavy artillery Lulz Cannons and decided to switch to ninja mode. From our LFI entry point,we acquired command execution via local file inclusion of enemy flee. Apache vessel. We then found that the HTTPD had SSH auth keys, which let our ship SSH into other servers. See where this is going? We then switched to root ammunition rounds.And we rooted… and rooted… and rooted… After mapping their internal network and thoroughly pillaging all of their servers, we grabbed all their source code and database password which we proceeded to shift silently back to our storage deck.

    Nothing yet whether these info are true.

    LulzSec, short for Lulz Security, the hacker group behind hacking the CIA, U.S. Senate, Nintendo, Sony and others. They took down the CIA’s website, hacked Sony’s servers, released sensitive documents from the Arizona state government and attacked the U.S. Senate’s website. While a suspected member of LulzSec was recently apprehended, the group claims he was not its leader.

    The team claim that they intended to only operate for 50 days as an attempt to revive the AntiSec movement, which is opposed to the computer security industry.

  • Mac OS X 10.7 Lion Server GM and iCloud Beta 3 Download Now


    Apple has seeded Mac OS X 10.7 Lion’s GM build to developers along with Server Edition and iCloud Beta 3. In a previous post we put tons of links to download OS X Lion GM. Now upgrade to Server Version and get iCloud Beta 3 in the below links:

    The GM build is generally the build that consumers will end up with and ready for mass production; however, if any major bugs are found, there could always be another seed. Apple has also released a new preview for Xcode. You can download OS X Lion GM below:

    Multiupload.com Links:

    • Mac OS X 10.7 Lion Server GM | 12.16 MB

    [hide 1]http://www.multiupload.com/Y0VWTTXIGB[hide 1]

    Rapidshare.com Links:

    • Mac OS X 10.7 Lion Server GM | 12.16 MB

    [hide 1]http://www.multiupload.com/RS_Y0VWTTXIGB[hide 1]

    Multiupload.com Links:

    • iCloud Beta 3 | 25.03 MB

    [hide 1]http://www.multiupload.com/FF72F22H9I[hide 1]

    Rapidshare.com Links:

    • iCloud Beta 3 | 25.03 MB

    [hide 1]http://www.multiupload.com/RS_FF72F22H9I[hide 1]