Did You Know a Device Can Be Destroyed Remotely?

Taiwo Owolabi
1 min readJun 18, 2024

--

In cybersecurity, the term “bricking” refers to rendering a device permanently unusable, making it as useful as a brick. Bricking can occur for several reasons:

  1. Software Updates Gone Wrong: Firmware or software updates can sometimes fail, especially if interrupted by a power outage, leading to a corrupted operating system or firmware. For instance, in 2018, many iPhone 7 users experienced bricking after updating to iOS 11.3, particularly those with third-party replacement screens. These devices needed professional repair because the issue couldn’t be resolved remotely.
  2. Malware or Hacking: Malicious software or. hacking attempts can corrupt a device’s software or firmware intentionally, preventing it from operating normally. This might be done for espionage, sabotage, or ransomware attacks.
  3. Incorrect Modifications: Users attempting to modify or “root” their devices can make mistakes, such as improperly altering critical system files, which can result in bricking.
  4. Hardware Failures: Irreversible hardware failures, such as a corrupted storage drive or malfunctioning motherboard, can also brick a device.

When a device is bricked, it cannot be used for its intended purpose and often requires technical intervention to repair, if repair is even possible. In severe cases, data stored on the device may become inaccessible.

You can access my portfolio here: https://detotowolabi.carrd.co/

--

--