Create an Account
username: password:
 
  MemeStreams Logo

MemeStreams Discussion

search


This page contains all of the posts and discussion on MemeStreams referencing the following web page: Exploiting the iPhone. You can find discussions on MemeStreams as you surf the web, even if you aren't a MemeStreams member, using the Threads Bookmarklet.

Exploiting the iPhone
by Decius at 10:08 am EDT, Jul 23, 2007

Fully working remote exploit plus malware! Wheee...


 
RE: Exploiting the iPhone
by Stefanie at 11:16 am EDT, Jul 23, 2007

Decius wrote:
Fully working remote exploit plus malware! Wheee...

Related Article

IPhone Flaw Lets Hackers Take Over, Security Firm Says
By John Schwartz
July 23, 2007

A team of computer security consultants say they have found a flaw in Apple’s wildly popular iPhone that allows them to take control of the device.

The researchers, working for Independent Security Evaluators, a company that tests its clients’ computer security by hacking it, said that they could take control of iPhones through a WiFi connection or by tricking users into going to a Web site that contains malicious code. The hack, the first reported, allowed them to tap the wealth of personal information the phones contain.

Although Apple built considerable security measures into its device, said Charles A. Miller, the principal security analyst for the firm, “Once you did manage to find a hole, you were in complete control.” The firm, based in Baltimore, alerted Apple about the vulnerability this week and recommended a software patch that could solve the problem.

A spokeswoman for Apple, Lynn Fox, said, “Apple takes security very seriously and has a great track record of addressing potential vulnerabilities before they can affect users.”

“We’re looking into the report submitted by I.S.E. and always welcome feedback on how to improve our security,” she said.

There is no evidence that this flaw had been exploited or that users had been affected.

Dr. Miller, a former employee of the National Security Agency who has a doctorate in computer science, demonstrated the hack to a reporter by using his iPhone’s Web browser to visit a Web site of his own design.

Once he was there, the site injected a bit of code into the iPhone that then took over the phone. The phone promptly followed instructions to transmit a set of files to the attacking computer that included recent text messages — including one that had been sent to the reporter’s cellphone moments before — as well as telephone contacts and e-mail addresses.

“We can get any file we want,” he said. Potentially, he added, the attack could be used to program the phone to make calls, running up large bills or even turning it into a portable bugging device.

Steven M. Bellovin, a professor of computer science at Columbia University, said, “This looks like a very genuine hack.” Mr. Bellovin, who was for many years a computer security expert at AT&T Labs Research, said the vulnerability of the iPhone was an inevitable result of the long-anticipated convergence of computing and telephony.

“We’ve been hearing for a few years now that viruses and worms were going to be a problem on cellphones as they became a little more powerful, and we... [ Read More (0.5k in body) ]


 
 
Powered By Industrial Memetics