reply to discussion

Post a reply to the thread: iPhone Security Breach Gives Hackers Access To Your Private Data

Your Message

If you are already a member Click here to log in
 
  • :)
  • :heart:
  • :(
  • ;)
  • :p
  • :cool:
  • :rolleyes:
  • :ah:
  • :evil:
  • :flamemad:
  • :sad:
  • :laugh:
  • :D
  • :smart:
  • :blush:

Send Trackbacks to (Separate multiple URLs with spaces)

You may choose an icon for your message from this list

Additional Options

  • Will turn www.example.com into [URL]http://www.example.com[/URL].

  • If selected, :) will not be replaced with smile

Subscription

Topic Review (Newest First)

  • 02-13-2011, 08:13 PM
    lovecandy
    : Researchers in Germany (from the Fraunhofer Institute, the same place that brought us the MP3) have deduced a method to retrieve, without your authorization, all of your iPhone’s secrets. Passwords, that is. And it only takes six minutes. Oh dear.
    The attack, which requires physical access to the iPhone (i.e. the attack cannot be done remotely), reveals user passwords and other sensitive information. The phone is jailbroken, then a series of scripts are run that effectively circumnavigate the phone’s encryption. (Note that the encryption isn’t actually broken in this attack.) Passwords for things like e-mail accounts and Wi-Fi networks are readily available to the attacker. And once the attacker has your e-mail account credentials, what’s to stop him from requesting your Facebook or Twitter password be reset? Bam, now he has that, too.
    The glitch affects all iOS devices running the latest firmware.
    What should you do if you lose your iPhone? Your best bet is to change any and all passwords that may have been used on the device: your e-mail, social networks, Amazon, etc. If you’ve logged into a service using the phone then you need to assumed an evildoer will have access to that password.
    Incidentally, The iPhone Guru has step-by-step directions on how you can remove your iPhone’s passcode (the “scroll to unlock” one) with just a few pieces of software. You’d be doing this primarily to demonstrate to yourself how puny iPhone security truly is. How about this: keep your phone glued to your person at all times, lest you find yourself in an unenviable situation. - MobileCrunch

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •