>" Moore posted to the site an exploit that would allow a hacker to insert
>malicious code onto someone's iPhone to access the device's data

This is the hack that was being used for several months now to get a 
non-Apple application into the iPhone. eWeek says that it only works on 
iPhones that have been tinkered with to add bin/sh. This does not exist 
on the iPhone as delivered by Apple. So I am less excited about this than 
you are. After all if you have to modify the iPhone to make it 
susceptible to an attack it is hardly something you can blame Apple for. 
Maybe Apple is right to brick any iPhone that has been tampered with.

eweek.com/article2/0,1895,2197476,00.asp


************************************************************************
* ==> QUICK LIST-COMMAND REFERENCE - Put the following commands in  <==
* ==> the body of an email & send 'em to: [EMAIL PROTECTED] <==
* Join the list: SUBSCRIBE COMPUTERGUYS-L Your Name
* Too much mail? Try Daily Digests command: SET COMPUTERGUYS-L DIGEST
* Tired of the List? Unsubscribe command: SIGNOFF COMPUTERGUYS-L
* New address? From OLD address send: CHANGE COMPUTERGUYS-L YourNewAddress
* Need more help? Send mail to: [EMAIL PROTECTED]
************************************************************************
* List archive at www.mail-archive.com/[email protected]/
* RSS at www.mail-archive.com/[email protected]/maillist.xml
* Messages bearing the header "X-No-Archive: yes" will not be archived
************************************************************************

Reply via email to