iPhone Major Hacker Target in 2008
- Posted: Tuesday, December 18, 2007
- |
- Author: pradhana
- |
- Filed under: Apple, iPhone, Smartphone, Wi-Fi
Researchers at Arbor Networks are predicting the iPhone will be the subject of serious attacks from hackers in 2008. Hackers already broke Apple's security system in 2007, but Arbor Networks predicts that hackers are attracted to attacking Apple users and to becoming the first to hack a new platform.
The attacks, they say, will likely take the form of malware embedded in photos or video. Until its latest update, the iPhone was vulnerable to such attacks through a bug in its handling of TIFF images. Previous versions of Apple's firmware used a version of the libtiff library that was susceptible to buffer-overflow attacks.
"2007 was the year of the browser exploit, the data breach, spyware, and the storm worm," the Arbor report said. "We expect 2008 to be the year of the iPhone attack, the Chinese Hacker, P2P network spammers, and the hijacking of the Storm botnet."
Apple's release of a software development kit for the iPhone in 2008 could unleash a host of attacks, and AT&T and all WiFi networks in range could be the next target, noted Andrew Storms, director of security operations for nCircle Security.
The prediction is hardly a risky one, said Storms. "Predicting a higher rate of attacks on the iPhone is like saying there will be more people trying to hack Leopard in 2008," he wrote in an e-mail.
"This is an obvious direction for the hacking community," he added. "Those who hack for good or bad are always interested in the newest target and even better is a new target with a large install base."
But, things will change in 2008, Storms said, especially with Apple's release of a software development kit for the iPhone. "Once the SDK releases, everyday users will be installing third-party applications without having to risk an iBrick," he said, referring to the fact that uses who installed unlocking software found their phones were inoperative after an Apple firmware upgrade.
"The tools and methods which Apple integrates into the iPhone to protect users from malware developed with the SDK is what will be getting significant attention in 2008," he said, predicting that AT&T and all Wi-Fi networks in range of the iPhone will be the next target.
"Imagine a successful mobile worm that distributes itself over both cellular and WiFi," he said. "That's a day that security professionals have been worrying about for years." [FierceBroadbandWireless]
Search-
E-Commerce Optimization-
Nice Offers, Great Savings-
Recent Comments-
Sponsor Ad-
Blog Feeds-
Sponsor Ad-
You Are The Visitor No:-
Categories-
- 3G Handset (35)
- 3G Networks (3)
- 4G (2)
- Adobe (4)
- Android Phone (16)
- Apple (63)
- Artisteer (1)
- Bandwidth (1)
- Biometric (1)
- Biometric Spending (1)
- Blackberry (15)
- Bluetooth (10)
- BREW (3)
- Broadband (34)
- BTS (2)
- Business Applications (1)
- BWA (1)
- CDMA (6)
- China Mobile (2)
- Cisco (1)
- CPE (1)
- Digital Media (26)
- DTT Service (1)
- Electronic Crime (1)
- FCC White Space (2)
- Femtocell (12)
- Firefox (1)
- Fixed-Broadband (1)
- Fixed-Mobile Convergence (3)
- Gadget (55)
- Global Education (1)
- Go Green (1)
- Google (32)
- Google Android (28)
- Google's Chrome (2)
- GPS Devices (3)
- Handset (34)
- Hard Drive (2)
- HDTV (2)
- Hewlett-Packard (1)
- Home Area Networks (3)
- HSDPA (18)
- HSDPA Handset (1)
- HSPA (3)
- HTC (13)
- IMS (1)
- Inflight WiFi Access (2)
- Internet Camera (2)
- Internet Phone (1)
- Internet Users (2)
- iPad (10)
- iPhone (81)
- iPhone Security (1)
- iPlayer (1)
- iPod (12)
- IPTV (4)
- iTunes (1)
- Laptop (2)
- Latitude (1)
- LBS Infrastructures (2)
- LBS Service (5)
- LG (18)
- LiMo (1)
- Linux (4)
- LTE (31)
- m-payment (2)
- M2M Devices (1)
- Market Survey (77)
- Merger and Acquisition (4)
- Microsoft (11)
- Miscellaneous (104)
- Mobile 3G (21)
- Mobile Advertising (13)
- Mobile Applications (10)
- Mobile Broadband (4)
- Mobile Business (4)
- Mobile Consumers (1)
- Mobile Content (37)
- Mobile Data (3)
- Mobile Device (4)
- Mobile Features (1)
- Mobile Future (1)
- Mobile Gaming (5)
- Mobile Internet (4)
- Mobile Music (2)
- Mobile Network (2)
- Mobile Phone Sales (2)
- Mobile Services (46)
- Mobile TV (20)
- Mobile Web Browser (3)
- Mobile Web Development (1)
- Mobile Web Security (1)
- Mobile WiMAX (34)
- Motorola (22)
- Mozilla (1)
- MP3 Player (5)
- Multimedia (1)
- My Column (37)
- MySpace (6)
- Netbook (4)
- New Format (3)
- New Music Experience (1)
- NextGen Mobile (1)
- Nokia (46)
- Non-Handset (1)
- NTT DoCoMo (8)
- Opera (13)
- Presto Application (1)
- Qualcomm (10)
- RFID (11)
- RIM (4)
- RTIV (1)
- Samsung (27)
- Search Ads (1)
- Skype (7)
- Smartphone (79)
- Social Networking (9)
- Sony Ericsson (29)
- Storage (3)
- Strategic Partnership (3)
- Symbian OS (1)
- Toshiba (1)
- Twitter (2)
- Ultra Mobile Device (2)
- User Generated Content (1)
- Verizon Wireless (3)
- Video Server (1)
- Vision (1)
- VoIP (12)
- VoWi-Fi (1)
- WCDMA (2)
- Web 2.0 (6)
- Wi-Fi (45)
- Wi-Fi Hotspots (4)
- WiMax (59)
- Windows Mobile (12)
- Wireless Service (48)
- Wireless Video (3)
- Yahoo (6)
- YouTube (4)
- Zumobi (1)
- Zune (4)
Blog Archive-
Lemon Twist Blogger Template is an extremely beautiful blogger template created by JackBook.Com based on Lemon Twist Wordpress themes by farfromfearless.com. Thanks to Chris Murphy and Jacky Supit for this great template.
- Copyright © 2008-2011 Mobile & Wireless. All Rights Reserved. Powered by Blogger
- Back To Top
- Log in
- Blogger
- Home
Recommended Links-