Il n'y a pas de plateforme invulnérable. Ce n'est qu'une question d'interet.
Les hackers s'interessent à Windows parce que le "marché" est le plus
important. Eventuellement par contre, il y aura plus de smartphone dans le
monde que de PC...et le Iphone est le leader actuel de ce segment.

On Sun, Jul 5, 2009 at 12:34 AM, Kenneth Chen <[email protected]> wrote:

> Tenez, avec la popularite des iPhones, on commence a s'interesser plus
> a leurs failles...
>
>
> http://ca.tech.yahoo.com/cell_phones/accessories/digital_trends/article/3696
>  Mac Security Expert Identifies iPhone SMS 
> Vulnerability<http://ca.tech.yahoo.com/cell_phones/accessories/digital_trends/article/3696#>
>   More
> from Digital Trends
>
>    - Digital Trends 
> Home<http://ca.rd.yahoo.com/ca/tech/digitaltrends/SIG=118vv2qlj/**http%3A%2F%2Fwww.digitaltrends.com%2F>
>    - 
> Reviews<http://ca.rd.yahoo.com/ca/tech/digitaltrends/SIG=11co60cob/**http%3A%2F%2Freviews.digitaltrends.com%2F>
>    - 
> News<http://ca.rd.yahoo.com/ca/tech/digitaltrends/SIG=1193eehrn/**http%3A%2F%2Fnews.digitaltrends.com%2F>
>    - 
> Videos<http://ca.rd.yahoo.com/ca/tech/digitaltrends/SIG=11a3vrse5/**http%3A%2F%2Fmedia.digitaltrends.com%2F>
>    - Shop for the latest 
> products<http://ca.rd.yahoo.com/ca/tech/digitaltrends/SIG=11931veu7/**http%3A%2F%2Fshop.digitaltrends.com%2F>
>
> At the SyScan security conference being held in Singapore this week,
> Macintosh security expert Charlie Miller has outlined an SMS-based
> vulnerability in the Apple iPhone that could let attackers listen in on
> calls, access the GPS unit to locate the phone, execute arbitrary programs,
> and even let the phone participate in distributed denial-of-service (DDOS)
> attacks against other Internet sites via the Internet.
>
> Miller didn't go into significant detail on the exploit, although he
> planned to discuss the possible attack in greater detail at the Black Hat
> security conference later this month in Las Vegas, Nevada. Apple is expected
> to offer a patch for the vulnerability before then.
>
> The vulnerability enables attackers to send a program to the iPhone-140
> bytes at a time via SMS-which the iPhone then executes as its root user with
> no interaction or confirmation required from the iPhone's owner. In theory,
> the exploit could be used to access virtually any of the iPhone's functions
> or run any program, if enough exploitative SMS messages could be delivered
> to the iPhone.
>
> The exploit serves as an illustration of the potential pitfalls of ever
> more-sophisticated mobile devices: as users are increasingly isolated from
> the fundamentals of the technologies they're using, they often have no way
> to know whether their devices or personal information are vulnerable or have
> been compromised.
>
> ------------------------------
> Looking for the perfect gift?* Give the gift of 
> Flickr!*<http://www.flickr.com/gift/>
>



-- 
Martin Pham Dinh
[email protected]
http://martinphamdinh.googlepages.com/

Répondre à