Please Scroll Down to See Forums Below
How to install the app on iOS

Follow along with the video below to see how to install our site as a web app on your home screen.

Note: This feature may not be available in some browsers.

napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
Research Chemical SciencesUGFREAKeudomestic
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsResearch Chemical SciencesUGFREAKeudomestic

Researchers hack into iPhone via Web

javaguru

Banned
http://news.yahoo.com/s/ap/20070724/ap_on_hi_te/iphone_hack;_ylt=Ainus7DVKUtbS8.6ddxmHz7MWM0F

By PETER SVENSSON, AP Technology Writer
Tue Jul 24, 7:44 AM ET



NEW YORK - Hackers could take control of an iPhone if its owner visits a doctored Web site or Internet hotspot, security researchers reported Monday.

The vulnerability of the vaunted device, Apple Inc.'s first cell phone, is only theoretical for now. There are no reports of criminals actually taking advantage of the security glitch to remotely access an iPhone.

But if it were exploited, hijacked iPhones could be very useful to the same gangs that take over personal computers and use them to disseminate spam, said Charlie Miller, principal security analyst at Independent Security Evaluators, which discovered the flaw.

"You could have a million iPhones dialing the company's main line and overwhelm it that way," Miller said.

In addition, hijacked iPhones could be used to send spam by cell-phone text message, which computers generally can't. Any personal data on the phones, such as private phone numbers and text messages, would be accessible as well.

The flaw applies not only to the iPhone, which was launched just three weeks ago, but also to Apple computers running Mac OS and the company's Safari Web browser, a version of which comes with the iPhone. It does not affect Safari running on Microsoft Corp.'s Windows systems.

The researchers at Baltimore-based ISE haven't released the specifics of the vulnerability to the public, but have provided details to Apple and supplied the company with a patch, a software update for plugging the hole.

On Aug. 2, Miller will present details of the flaw at the Black Hat USA hacker conference in Las Vegas and online. That will make it easier for criminals to replicate the exploit, but he stressed that it should also be easy for Apple to release a patch to all its users before then. The iPhone and Macintosh computers are configured to receive software updates automatically from Apple.

"Hopefully, on Aug. 2, nothing happens: we release the information, everyone's patched and that's it," Miller said.

Apple spokeswoman Lynn Fox said Apple is looking into ISE's report, but would not say if there are plans for a patch.

"We always welcome feedback on our security," Fox said.

Miller said the flaw did not necessarily reflect badly on Apple.

"I'm sure that if you put any sort of mobile device that's complex enough in front of me, we'd find pretty much the same thing," he said. At the same time, "the security of the iPhone is not as good as the security of the Mac desktop, and I think that's something they need to work on."

Miller and the rest of the ISE team, which included Jake Honoroff and Joshua Mason, discovered holes in the security of the iPhone within minutes of getting their hands on their boss' phone.

"He didn't really want to let us do it, but eventually he gave in, and we poked around with it for a few minutes, and already saw some things that could make the programs crash," Miller said.

Their technique, called "fuzzing," involves sending lots of random or improperly formatted data to a device, and noting what causes crashes or other problems that could be openings to sending code that takes over the device.

To protect an iPhone against this and similar future vulnerabilities, the ISE team recommends that users only visit sites they trust, not open Web sites from e-mails and not use unfamiliar Wi-Fi hotspots.
 
javaguru said:
A lot of people are operating under the assumption that using an Apple product , OS or Iphone, to surf the web is 100% safe. :)



Same douche nips that think that getting a Mac makes them invulnberable to viruses and other malware.

Nigga... Please.

Even when their OS was Mac and not skinned Linux it was vulnerable, just as if not more than any other - but because there was a total of like 10-20 on the intertubes - very few viruses existed for them *IN THE WILD* because they weren't a worthy target. That doesn't make them any more secure. Security by obscurity is moronic.
 
I got a mac, but I still protect it like it was a windoze machine. It's still a target, and will be an even bigger target in the future.
 
Are they able to cover the iphone with Swarovski crystals? I have not bought one yet because I have not found someone who will do that, and I love my blingged out Razr.
 
Freddie de Lux said:
Are they able to cover the iphone with Swarovski crystals? I have not bought one yet because I have not found someone who will do that, and I love my blingged out Razr.

They decked mine own with broken glass so I'd feel tuff :goatslaye
 
javaguru said:
The vulnerability of the vaunted device, Apple Inc.'s first cell phone, is only theoretical for now. There are no reports of criminals actually taking advantage of the security glitch to remotely access an iPhone.

but by all means, let's write about it to give the geniuses the idea! :chomp:
 
KBEKQT said:
but by all means, let's write about it to give the geniuses the idea! :chomp:

They're all over it, always have been, always will be...

Not writing about it only allows the public to go on thinking everything is secure.
 
Top Bottom