seguridad iphone

Mobile Devices Drawing More Attackers’ Attention

As mobile devices such as iPhones, BlackBerrys, Android phones and others have become more sophisticated and easy to use, many users have made them their main computing and Web-browsing devices. And that evolution naturally has caught the attention of attackers who have begun tailoring more and more of their attacks at these mobile platforms.

Researcher Finds Data Access Flaw in iPhone

A researcher was able to gain unfettered access to
his iPhone 3GS from Ubuntu 10.04. If he connected the device whilst it
was turned off and then turned it on, Ubuntu auto-mounted the file
system and was able to access several folders despite never having
previously been connected to the iPhone. Read the full article. [The H Security]

Apple Plugs Critical iPhone Security Holes

Apple has shipped a patch to cover five documented vulnerabilities that expose iPhone and iPod Touch users to malicious hacker attacks. The most serious flaw could allow remote code execution if an iPhone/iPod Touch user opens audio and image files.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.