iPhone Attacks Imminent
Results 1 to 10 of 10

Thread: iPhone Attacks Imminent

  1. #1
    Senior Member phernandez's Avatar
    Join Date
    Aug 2003
    Location
    NYC
    Posts
    246

    iPhone Attacks Imminent

    What, like it wasn't bound to happen?


    Safari Vulnerability Leaves Apple iPhone Open To Attack - CRN

    Security experts say that the design flaw, which was detected by researchers at application delivery solutions company Radware earlier this week, triggers a series of memory allocation operations on the memory pool, which in turn triggers another bug in the garbage collector.

    In order to exploit the vulnerability, a user would have to open a malicious HTML page containing javascript, usually through some kind of social engineering tactic such as phishing e-mail. Researchers said that in a worst case scenario, the user will experience an application level denial of service attack that could result in a complete crash of the Safari browser. The crashed browser could ultimately escalate the malfunction to the point of paralyzing the entire iPhone appliance.
    There's a great quote from a Radware manager that will have more than one of you nod in agreement.

  2. #2
    Banned
    Join Date
    Jan 2008
    Posts
    605
    However, that will likely change as the iPhone becomes more popular and marketshare increases, experts say.
    There hasn't been very much going for PDA's and yet they've been around for a good number of years now. At best, this looks like a slow couple of months for articles.

  3. #3
    Senior Member
    Join Date
    Oct 2003
    Location
    MA
    Posts
    1,052
    Mac software buggy? NO WAY! Ask the mac fanboys they will tell you how perfect it is...

  4. #4
    Senior Member phernandez's Avatar
    Join Date
    Aug 2003
    Location
    NYC
    Posts
    246
    Trying to start a flamewar, are we?

  5. #5
    Senior Member
    Join Date
    Oct 2003
    Location
    MA
    Posts
    1,052
    Haha oops! :-P

  6. #6
    Senior Member isildur's Avatar
    Join Date
    Feb 2003
    Posts
    166
    and remember, it's not a bug, it's a feature.
    Only trust Pipe-smoking Penguins.

  7. #7
    Senior Member
    Join Date
    Oct 2003
    Location
    MA
    Posts
    1,052
    Haha of course

  8. #8
    Senior Member JPnyc's Avatar
    Join Date
    Jan 2005
    Posts
    2,734
    I somehow doubt there'll be a fullscale war waged on any type of handheld devices, iphones or any other variety. Where's the motivation? Someone compromises a system for 1 of 3 main reasons: For prestige, to create a spam zombie, or to steal sensitive info.

    The prestige aspect won't fly because unlike hacking into a server that hosts some page, you can't demonstrate that you've hacked into a phone. How would anyone else know you've done it, other than the owner of course?

    Spam networks want to infect something that's online a lot, preferably a broadband user who rarely shuts down. Handhelds are off a lot more than they're on.

    As for sensitive info, I dunno anyone who accesses their bank accts. or similar sites, with a wireless device. Maybe there are lots, and I just don't know 'em.

  9. #9
    Senior Member isildur's Avatar
    Join Date
    Feb 2003
    Posts
    166
    Quote Originally Posted by JPnyc
    As for sensitive info, I dunno anyone who accesses their bank accts. or similar sites, with a wireless device. Maybe there are lots, and I just don't know 'em.
    Ah, but you would be able to see how many times I searched for busy blondes on Youtube ;-)
    Only trust Pipe-smoking Penguins.

  10. #10
    Senior Member JPnyc's Avatar
    Join Date
    Jan 2005
    Posts
    2,734
    OK, so your wife has motivation to hack into your iphone

Similar Threads

  1. A look into IDS/Snort Whole thing by QoD
    By qod in forum The Security Tutorials Forum
    Replies: 6
    Last Post: February 27th, 2004, 03:03 AM
  2. A look into IDS/Snort part 1 of 3
    By qod in forum The Security Tutorials Forum
    Replies: 18
    Last Post: January 5th, 2004, 02:30 PM
  3. Tcp/ip
    By gore in forum Newbie Security Questions
    Replies: 11
    Last Post: December 29th, 2003, 08:01 AM
  4. Understanding DoS
    By NullDevice in forum The Security Tutorials Forum
    Replies: 21
    Last Post: December 17th, 2003, 10:03 PM
  5. Classic Social Engineering Attacks
    By Striek in forum The Security Tutorials Forum
    Replies: 10
    Last Post: December 16th, 2003, 09:30 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •