1. Welcome to NikonCafe.com—a friendly Nikon camera & photography discussion forum!

    If you are thinking of buying a camera or need help with your photos, you will find our forum members full of advice! Click here to join for free!

iPhone Users -- welcome to our world!!

Discussion in 'General Discussion' started by Minuteman3, Jul 24, 2007.

  1. So, now we Windows users have company!! Wecome aboard!! :smile:



    NEW YORK (AP) - Hackers could take control of an iPhone if its owner visits a doctored Web site or Internet hotspot, security researchers reported Monday.

    The vulnerability of the vaunted device, Apple Inc.'s first cell phone, is only theoretical for now. There are no reports of criminals actually taking advantage of the security glitch to remotely access an iPhone.

    But if it were exploited, hijacked iPhones could be very useful to the same gangs that take over personal computers and use them to disseminate spam, said Charlie Miller, principal security analyst at Independent Security Evaluators, which discovered the flaw.

    "You could have a million iPhones dialing the company's main line and overwhelm it that way," Miller said.

    In addition, hijacked iPhones could be used to send spam by cell-phone text message, which computers generally can't. Any personal data on the phones, such as private phone numbers and text messages, would be accessible as well.

    The flaw applies not only to the iPhone, which was launched just three weeks ago, but also to Apple computers running Mac OS and the company's Safari Web browser, a version of which comes with the iPhone. It does not affect Safari running on Microsoft Corp.'s Windows systems.

    The researchers at Baltimore-based ISE haven't released the specifics of the vulnerability to the public, but have provided details to Apple and supplied the company with a patch, a software update for plugging the hole.

    On Aug. 2, Miller will present details of the flaw at the Black Hat USA hacker conference in Las Vegas and online. That will make it easier for criminals to replicate the exploit, but he stressed that it should also be easy for Apple to release a patch to all its users before then. The iPhone and Macintosh computers are configured to receive software updates automatically from Apple.

    "Hopefully, on Aug. 2, nothing happens: we release the information, everyone's patched and that's it," Miller said.

    Apple spokeswoman Lynn Fox said Apple is looking into ISE's report, but would not say if there are plans for a patch.

    "We always welcome feedback on our security," Fox said.

    Miller said the flaw did not necessarily reflect badly on Apple.

    "I'm sure that if you put any sort of mobile device that's complex enough in front of me, we'd find pretty much the same thing," he said. At the same time, "the security of the iPhone is not as good as the security of the Mac desktop, and I think that's something they need to work on."

    Miller and the rest of the ISE team, which included Jake Honoroff and Joshua Mason, discovered holes in the security of the iPhone within minutes of getting their hands on their boss' phone.

    "He didn't really want to let us do it, but eventually he gave in, and we poked around with it for a few minutes, and already saw some things that could make the programs crash," Miller said.

    Their technique, called "fuzzing," involves sending lots of random or improperly formatted data to a device, and noting what causes crashes or other problems that could be openings to sending code that takes over the device.

    To protect an iPhone against this and similar future vulnerabilities, the ISE team recommends that users only visit sites they trust, not open Web sites from e-mails and not use unfamiliar Wi-Fi hotspots.
  2. Toby D

    Toby D

    Mar 7, 2006
    no one or no thing is safe anymore. I may become a Luddite after all.
  3. As long as I don't get a virus in my D200, then I'm in good shape.:smile:
  4. Let them have at it.... as for me, I love my iphone
  5. wbeem


    Feb 11, 2007
    Sanford, FL
    William Beem
    You know, this isn't much of a problem to me. As stated, the flaw is theoretical right now, no such cases exist. It's something easily patched. Microsoft and Apple both apply security patches to their customers. It's just that Microsoft has to do it far more frequently.

    In the mean time, I'm a pretty happy customer. If they want to hack into my iPhone only to get the address of the local Hooters, let 'em go for it.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.