Friday, July 31, 2009

vulnerable to hacker attacks apple iPhone: researchers


Las Vegas usa - Security experts say the hackers to take control of the popular tool for identity theft and other crimes using the strategy for the exploitation that can wrong with Apple Inc's iPhone is open.

User that their iPhones, and Apple is not completely secure as soon as possible to repair this risk should take steps to need to be warned, the Las Vegas, one of the forums of the world's top computer security threats about information in return for the Black Hat conference said.

"It's scary. People I do not want to take on my iPhone," Charlie Miller, an independent security consulting firm, a security analyst with the evaluators, said in an interview.

Miller and Collin Mulliner, a Ph.D. Technical University in Berlin in a way that students easily from one carrier's network is a victim of the iPhone allow hackers to knock search.

To call it, Internet users to reach and save the text message in return, he said.

IPhones in the Black Hat criminals in about two weeks to break in to develop software for the information presented will have enough information.

They, in the middle of July, but Apple has warned that the fault of the company still has to decide.

If the answer is not "Apple's reputation and credibility could get hurt. Good discussion is positive, negative buzz is more harmful," Trip Chowdhry, an analyst with Global Equity Research said.

About 4,000 security professionals in attendance, including some who were in fact hackers. However, defense experts and users to determine the software defects detection, pranks hackers will use the same information or crime.

How researchers call iPhones through the SMS system to send the computer to break the code shown to the audience. Sending and receiving mobile phone text message software upgrade for use with SMS. He said that users of this phone is that the malicious code can not be identified.

Although the law against them to break in to use this computer to hack the system to explain the way, is not illegal.

When this kind of information on why they in the hands of criminals is asked, the security experts that the public in the form of iPhones just as personal computers vulnerable to attack alert was required to have had.

"If we do not talk about it, no one to do it quietly goes. Bad people it does not matter what are going to," Mulliner said.

They successfully iPhones in Germany on a network of four carriers AT & T Inc. with the United States also come with a test of the hacks have to. IPhone carriers around the world the methods they will work with the trust said.

They call the two of Google Inc. Android operating system running on the break to have used a similar method. This vulnerability, they notified the company of Google's fault compromise.

Apple officials immediately reached for comment could not be.

No comments:

Post a Comment

JS-Kit Comments