Month of iPhone Hacks
Why did no-one think of this [marketing managers around the world - hang your head in shame]. We all know how buggy Apple software is, it's just that, until recently, nobody cared. But we have just witnessed the most publicised hardware release in recent times. And are we now about to witness an equally large attack on this useless little toy.
It took a couple of days to finally get the iPhone service activated. But as soon at they got it working, it took researchers at Errata Security only a few minutes to find multiple security vulnerabilities in the iPhone.
So far, Errata has found three main flaws in the long-awaited and much-hyped mobile phone/music/video player/mobile Web/email client device:
Read the article HERE.
==============================================
Hackers get access to iPhone firmware
Hackers found the link to download the restore image for iPhone hidden away on Akamai mirrors. They're now working on how to open the encrypted OS X disk image within the restore file -- the key is somewhere in the iPhone itself. How long till the device is hacked and we get the ability to use SIM cards from any carrier and load in our own plugins and apps?
Read the article HERE.
It took a couple of days to finally get the iPhone service activated. But as soon at they got it working, it took researchers at Errata Security only a few minutes to find multiple security vulnerabilities in the iPhone.
So far, Errata has found three main flaws in the long-awaited and much-hyped mobile phone/music/video player/mobile Web/email client device:
Read the article HERE.
==============================================
Hackers get access to iPhone firmware
Hackers found the link to download the restore image for iPhone hidden away on Akamai mirrors. They're now working on how to open the encrypted OS X disk image within the restore file -- the key is somewhere in the iPhone itself. How long till the device is hacked and we get the ability to use SIM cards from any carrier and load in our own plugins and apps?
Read the article HERE.
0 Comments:
Post a Comment
<< Home