Quantcast

iPh-owned: Apple Device Vulnerable To Attack

Get the WebProNews Newsletter:
[ Technology]

Code injection from a malicious website would make it possible to subvert the Apple iPhone into giving up data or even acting as a bugging device.

iPh-owned: Apple Device Vulnerable To Attack
iPh-owned: Apple Device Vulnerable To Attack

That expensive, gorgeous phone/Internet device/media player sitting in thousands of pockets and purses could be a gateway to tears, at least until Apple fixes a problem that will be the talk of the Black Hat conference starting later this week.

Researchers at Independent Security Evaluators discovered a hole in the iPhone’s security. The New York Times cited Charles A. Miller, principal security analyst for the company, who said, “Once you did manage to find a hole, you were in complete control.”

Miller demonstrated how the injection of code from visiting a specially crafted website would affect the iPhone. The device responded to the test by transmitting text messages, contacts, and emails upon infection.

Until Apple patches the problem, Miller recommended on their website that iPhone users only visit sites and use WiFi networks that they trust. He also warned against opening links delivered by email to the iPhone, as viruses send links to malicious sites in emails that appear to come from trusted contacts.

iPh-owned: Apple Device Vulnerable To Attack
Comments Off
Top Rated White Papers and Resources

Comments are closed.