Security holes discovered in iPhones, iPads

SHARE:



SAN FRANCISCO (AP) — A new security hole has opened up in Apple Inc.'s iPhoneiPad and iPod Touch devices, raising alarms about the susceptibility of some of the world's hottest tech gadgets to hacker attacks.
Flaws in the software running those devices came to light after a German security agency warned that criminals could use them to steal confidential data off the devices. Apple, the world's largest technology company by market value, said Thursday that it is working on a fix that will be distributed in an upcoming software upgrade.With the security hole, an attacker can get malicious software onto a device by tricking its owner into clicking an infected PDF file. Germany's Federal Office for Information Security called the flaws "critical weaknesses" in Apple's iOS operating system.
Internet-connected mobile devices are still subject to fewer attacks than personal computer, but they could eventually prove a juicy target for hackers because they are warehouses of confidential banking, e-mail, calendar, contact and other data.
Software vulnerabilities are discovered all the time. What makes the latest discovery alarming is that the weaknesses are already being actively exploited — albeit in a consensual way. The latest concerns were prompted by the emergence of a new version of a program to allow Apple devices to run any software and circumvent the restrictions that Apple notoriously retains over software distributed through its online store. There are security risks of doing so, but many people find it liberating to install their own software.
Although this program is something people would seek out, the weaknesses that its authors discovered could easily be used for malice, security experts say.
There is an irony in the controversy: The site distributing the program offers a fix for the problem, but to get the fix, a user has to first install the program in question. So a user must defy Apple's restrictions to get the protection until Apple comes up with a fix of its own.
Charlie Miller, a prominent hacker of Apple products, said it likely took months to develop the program to break Apple's restrictions, but a criminal might need only a day or two to modify it for nefarious purposes.
Apple Inc. spokeswoman Bethan Lloyd said Thursday the company is "aware of this reported issue and developing a fix." She would not say when the update will be available.
One reason for gadget owners to take heart: Attacks on smartphones and other Internet gadgets are still relatively rare. One reason is PC-based attacks are still highly lucrative. Still, vulnerabilities such as the ones Apple is confronting show that consumers should take care of securing their mobile devices as they would their home computer.
"These things are computers — they're just small, portable computers that happen to have a phone tacked onto them," said Marc Fossi, manager of research and development for Symantec Security Response. "You've got to treat them more like a computer than a phone. You have to be aware of what's going on with these devices."

COMMENTS

Name

4G,1,Aerospace Engineering,2,AFP Consortium,1,amazon,3,Amazon india coupons,3,AMD,1,android,13,Anonymous,3,Antivirus,1,app,11,apple,24,apps,4,Assurance,1,Audi,2,auto,6,automation software,2,automotive technology,9,banking,1,bitcoin,1,BlackBerry,5,blockchain,1,BMW,1,brands,1,browser,2,Business,2,business strategy,1,cameraphone,3,car,12,car technology,8,CES,1,chromebook,3,Cloud computing,3,cloud Technology,2,companies,3,Consortium,1,content marketing,2,corporate,1,coupons,3,cyber crime,5,cyber security,21,data,3,data recovery,1,deals,1,Dell Streak,1,devices,2,digital currency,1,digital marketing,6,disk,1,e commerce,1,eBay,1,ebook,1,ecommerce,4,Electric Cars,9,electronics sale,2,elon musk,2,email,1,energy,1,entrepreneur,1,entrepreneurship,2,facebook,24,financial tech,1,firefox,2,firefox os,2,Flipkart,2,future business,1,future technology,22,gadget,31,gamail,1,games,6,google,18,google cars,1,google glass,3,Google I/O,1,Google+,8,goole ranking,1,Graphics Card,1,hackers,14,hacking,7,hardware,5,Hosting,3,How To Guides,10,How Tos,7,icloud,2,Information Technology,13,infosec,9,innovation,36,internet,8,Internet Explorer,1,Internet of Things,2,ios,5,IoT,2,ipad,8,iPhone,10,iPhone 8,1,iWatch,1,Jabong,1,laptop,3,LinkedIn,2,Lotus Notes,3,MacBook,3,mackbook air,2,Mark Zuckerberg,4,Mercedes,1,messenger,1,microsoft,5,mobile app development,7,mobile apps,11,mobile broadband,1,mobile enterprise,9,mobile recharge,2,mobility,11,mobility management,6,Motorola Xoom,1,Myntra,1,network,4,nokia,1,NSA,2,Nvidia,1,Objective-C,1,online course,1,online education,1,online recharge,1,online shopping,3,opreating system,4,Outlook,2,P2P,1,page ranking,1,patent,1,Payment,1,PayTM,1,pc software,1,photoshop,1,playstation,1,Porsche,1,process management,2,Procure,1,programming,1,programming language,2,Quality,1,Redbus,1,remote control,1,renewable energy,2,review,8,samsung,5,search engine,1,security,10,Self Driving Cars,10,SEO,2,smartphone,11,sms,1,Snapdeal,2,social media,5,social network,9,software,10,startup,2,steve jobs,3,storage,1,strategy,1,Supercars,1,Swift,1,tablet,9,team management,1,tech,4,tech conference,1,Tech event,2,Ted talk,1,Tesla,2,Tesla Motors,3,timeline,1,toolbar,1,tools,2,torrent,1,touchscreen,2,trdx,1,tutorial,2,twitter,3,udacity,1,udemy,1,ultrabook,1,USB,1,video,1,video editor,1,Virtual Reality,1,Volvo,2,VPN,3,Wearable gadget,2,Wearable Tech,2,Web 4.0,1,web technology,2,Wi-Fi,1,wikileaks,2,windows,6,Windows 8,8,Windows 8 Preview,1,workplace,1,X Mountain Lion,2,xcode,1,
ltr
item
TechFond - Latest Technology News & Analysis | Innovation | Startups | Reviews: Security holes discovered in iPhones, iPads
Security holes discovered in iPhones, iPads
http://3.bp.blogspot.com/-S1ipZ5iZcGk/ThvIGVnVmII/AAAAAAAAAtI/hwX2XHTzIp8/s1600/apple_iphone_ipad_tablet.jpg
http://3.bp.blogspot.com/-S1ipZ5iZcGk/ThvIGVnVmII/AAAAAAAAAtI/hwX2XHTzIp8/s72-c/apple_iphone_ipad_tablet.jpg
TechFond - Latest Technology News & Analysis | Innovation | Startups | Reviews
http://www.techfond.in/2011/07/security-holes-discovered-in-iphones.html
http://www.techfond.in/
http://www.techfond.in/
http://www.techfond.in/2011/07/security-holes-discovered-in-iphones.html
true
6925568668654321940
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy