Owners of hacked iPhones have begun posting instructions on how to roll back a recent Apple firmware upgrade that rendered their mobile phones unusable.The instructions were available Monday on the iPhone Dev Wiki, a Web site devoted to iPhone software hacks and tools.Since the iPhone’s launch, enthusiasts have been developing ways to allow the devices to run unauthorized software and to unlock them so that they can be run on any mobile network. Late last week, however, Apple cracked down on these efforts by releasing a software upgrade that made hacked iPhones unusable.Since that release, however, hackers have been working on techniques that reverse the effects of this upgrade. These latest instructions allow users to roll back their firmware upgrades and use some functions like the phone’s iPod and Wi-Fi capabilities, but they do not necessarily restore the phone’s ability to make calls, according to the iPhone Dev Wiki. That’s because hackers have not yet found a way to roll back the firmware used by the iPhone’s baseband chip, which is used to make calls.“So far all attempts to downgrade the baseband have been unsuccessful,” the Wiki said. “There have been several reports of successful baseband downgrades online, but these haven’t been confirmed. “ Another major area of research has been into techniques that can unlock iPhones that are running the latest 1.1.1 firmware.But because Apple has now done a much better job of encrypting its iPhone firmware, this will be a much harder job than it was the first time around, said Tom Ferris, a security researcher who works on hacking the iPhone.That’s what everybody’s working on right now is trying to get into the firmware,” he said. “Just like Steve Jobs said, it’s a cat and mouse game.” By Robert McMillan, IDG News Service (San Francisco Bureau) Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe