Minggu, 02 Agustus 2009

Hacker Can Hack iPhone using SMS

iPhone image

Digital security experts find weakness in the rift system for receiving SMS in iPhone. Weakness can be used by hackers to place malicious programs that take over control from the iPhone owner.

Techniques to attack iPhone via SMS demonstrated Charlie Miller, a security system from the observer Independent Security Evaluators and Collin Mulliner, student S3 field in the Network Security Telecommunications Technical University of Berlin in the Black Hat conference held in Las Vegas, on Thursday (30 / 7).

iPhone image

They show how the attack can be crippling iPhone so that it can not be used again. How to send an SMS message containing a code that can not see the victim. Code using the slit to enable themselves and kill a number of important software.

iPhone image

Other attacks can even control the victim's iPhone remotely. To do so, attackers send a SMS to 500 victims of the iPhone beruntun. Message contains the required code and utilize the active rift system on the iPhone revenues to respond to messages that come so much.

According to Miller, the attack through the short message will be the future trend. The reason, slit used in the main phone system, which is always active.

"That is the most well-worn means to perform the attack. I just need a phone number. During their phone on, I can send messages and the phone is doing something according to the command," said Miller.

They said that iPhone users need to diperingatkan about this disability. The Apple ocean itself must also find ways to overcome it. Of this problem, the Apple has actually contacted since the beginning of July for the right deal, but until now they have not made meaningful action.

Same techniques that hackers also have been used to break the mobile phone using Google Android OS. Fortunately at that time was unaware Google and create a patch soon penambal.

0 komentar:

Posting Komentar

About This Blog

Blog Archive

  © Blogger template AutumnFall by Ourblogtemplates.com 2008

Back to TOP