Featured Articles

Analyst reveals Apple Watch spec

Analyst reveals Apple Watch spec

An analyst has examined the Apple Watch supply chain in an effort to ascertain the exact spec of Cupertino’s new gadget…

More...
Nvidia's first 20nm product is a mobile SoC

Nvidia's first 20nm product is a mobile SoC

For much of the year we were under the impression that the second generation Maxwell will end up as a 20nm…

More...
Nvidia GTX 980 reviewed

Nvidia GTX 980 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Nvidia adjusts GTX 980 and GTX 970 pricing

Nvidia adjusts GTX 980 and GTX 970 pricing

It appears that Nvidia has been feeling the pulse of the market and took some note from comments regarding the original…

More...
PowerColor TurboDuo R9 285 reviewed

PowerColor TurboDuo R9 285 reviewed

Today we will take a look at the PowerColor TurboDuo Radeon R9 285. The card is based on AMD’s new…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Thursday, 30 July 2009 11:11

iPhone can be hacked with an SMS message

Written by Nick Farell

Image

That is security for you

In a week were it was revealed that the iPhone's encryption was about as useful as a chocolate teapot, security experts have worked out a way of cracking the Jesus phone by using an SMS message.

The news makes a mockery of Apple's claims that its software has superior security to anyone else.According to CNET an attacker could exploit the hole to make calls, steal data, send text messages, and do basically anything that the user does with their iPhone. The attack is enabled by a serious memory corruption bug in the way the iPhone handles SMS messages. There is no patch, despite the fact that Apple was notified of the problem about six weeks ago.

To be fair Android-based phones were found to be similarly susceptible to an SMS attack, but attacker could temporarily knock the phone off the network but not take control. Google patched the hole in a week and does not tell its users that it is invulnerable to attack either.

Previous iPhone attacks required an attacker to lure the iPhone user to visit a malicious Web site or open a malicious file, but this attack requires no effort on the part of the user and requires only that an attacker have the victim's phone number.

Once inside a victim's phone, the attacker could then send an SMS to anyone in the victim's address book and spread the attack from phone to phone.
Last modified on Thursday, 30 July 2009 12:09
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments