Breaking News

Viltrox launches AF 56mm Ultra-large aperture F1.2 Pro E and XF (APS-C) lenses Panasonic introduces AK-UBX100 4K multi-purpose camera Sony’s 360 Virtual Mixing Environment now available in Europe ASRock Releases AM5 Motherboard BIOS Update EnGenius Brings Wi-Fi 7 to Small Businesses with Affordable ECW510 Access Point

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

iPhone Vulnerable to Hackers

iPhone Vulnerable to Hackers

Smartphones Jul 23,2007 0

Apple 's iPhone may be vulnerable to hackers due to a flaw that allows them to take control of the device, according a report in the New York Times on Monday. Three researchers working for Independent Security Evaluators, a company that tests its clients' computer security by hacking it, said that they could take control of iPhones through a WiFi connection or by tricking users into going to a Web site that contains malicious code.

The iPhone runs a stripped down and customized version of Mac OS X on an ARM processor. Much of the device's claimed security is reliant on its restrictions against running third party applications. Only Javascipt code can be executed in the Safari web browser, ensuring that all such code executes in a "sandbox" environment. Many of the features of Safari have also been removed, such as the ability to use plug-ins such as Flash. Likewise, many filetypes cannot be downloaded. These actions serve to reduce the attack surface of the device.

"However, there are serious problems with the design and implementation of security on the iPhone," the researchers wrote in their report. "The most glaring is that all processes of interest run with administrative privileges. This implies that a compromise of any application gives an attacker full access to the device. Like the desktop versions of Mac OS X on which its operating system is based, the iPhone also does not utilize widely accepted practices, such as using address randomization or non-executable heaps, to make exploitation more difficult. These weaknesses allow for the easy development of stable exploit code once a vulnerability is discovered," they added.

To demonstrate these security weaknesses, the researchers created an exploit for the Safari browser on the iPhone. They used an unmodified iPhone to surf to a malicious HTML document that they created. "When this page was viewed, the payload of the exploit forced the iPhone to make an outbound connection to a server we controlled. The compromised iPhone then sent personal data including SMS text messages, contact information, call history, and voice mail information over this connection. All of this data was collected automatically and surreptitiously," the researchers said.

"After examination of the filesystem, it is clear that other personal data such as passwords, emails, and browsing history could be obtained from the device. We only retrieved some of the personal data but could just as easily have retrieved any information off the device," they added.

Additionally, the security consultants wrote a second exploit that performs physical actions on the phone. "When we viewed a second HTML page in our iPhone, it ran the second exploit payload which forced it to make a system sound and vibrate the phone for a second. Alternatively, by using other API functions we discovered, the exploit could have dialed phone numbers, sent text messages, or recorded audio (as a bugging device) and transmitted it over the network for later collection by a malicious party," the report concludes.

Apple was notified of these findings, including detailed technical documentation, on July 17th.

The New York Times said an Apple spokeswoman said the company took security "very seriously" and that it was looking into the report submitted by Independent Security Evaluators.

Tags: iPhoneApple
Previous Post
Nonprofit May Launch $350 Laptop by Christmas
Next Post
Helios Labs Launches the H2000

Related Posts

  • Apple unveils Mac Studio featuring M4 Max and new M3 Ultra

  • Apple introduces iPad Air with powerful M3 chip and new Magic Keyboard

  • Apple debuts iPhone 16e

  • The Leica LUX Grip For The iPhone

  • Apple introduces M4 Pro and M4 Max and new MacBook Pro

  • Apple unveils the new iMac with M4, supercharged by Apple Intelligence and available in fresh colors

  • Apple introduces powerful new iPad mini built for Apple Intelligence

  • Apple debuts iPhone 16 Pro and iPhone 16 Pro Max

Latest News

Viltrox launches AF 56mm Ultra-large aperture F1.2 Pro E and XF (APS-C) lenses
Cameras

Viltrox launches AF 56mm Ultra-large aperture F1.2 Pro E and XF (APS-C) lenses

Panasonic introduces AK-UBX100 4K multi-purpose camera
Enterprise & IT

Panasonic introduces AK-UBX100 4K multi-purpose camera

Sony’s 360 Virtual Mixing Environment now available in Europe
Consumer Electronics

Sony’s 360 Virtual Mixing Environment now available in Europe

ASRock Releases AM5 Motherboard BIOS Update
PC components

ASRock Releases AM5 Motherboard BIOS Update

EnGenius Brings Wi-Fi 7 to Small Businesses with Affordable ECW510 Access Point
Enterprise & IT

EnGenius Brings Wi-Fi 7 to Small Businesses with Affordable ECW510 Access Point

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Noctua NH-D15 G2

Noctua NH-D15 G2

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Soundpeats Pop Clip

Soundpeats Pop Clip

be quiet! Pure Base 501

be quiet! Pure Base 501

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed