Il n'y a pas de plateforme invulnérable. Ce n'est qu'une question d'interet. Les hackers s'interessent à Windows parce que le "marché" est le plus important. Eventuellement par contre, il y aura plus de smartphone dans le monde que de PC...et le Iphone est le leader actuel de ce segment.
On Sun, Jul 5, 2009 at 12:34 AM, Kenneth Chen <[email protected]> wrote: > Tenez, avec la popularite des iPhones, on commence a s'interesser plus > a leurs failles... > > > http://ca.tech.yahoo.com/cell_phones/accessories/digital_trends/article/3696 > Mac Security Expert Identifies iPhone SMS > Vulnerability<http://ca.tech.yahoo.com/cell_phones/accessories/digital_trends/article/3696#> > More > from Digital Trends > > - Digital Trends > Home<http://ca.rd.yahoo.com/ca/tech/digitaltrends/SIG=118vv2qlj/**http%3A%2F%2Fwww.digitaltrends.com%2F> > - > Reviews<http://ca.rd.yahoo.com/ca/tech/digitaltrends/SIG=11co60cob/**http%3A%2F%2Freviews.digitaltrends.com%2F> > - > News<http://ca.rd.yahoo.com/ca/tech/digitaltrends/SIG=1193eehrn/**http%3A%2F%2Fnews.digitaltrends.com%2F> > - > Videos<http://ca.rd.yahoo.com/ca/tech/digitaltrends/SIG=11a3vrse5/**http%3A%2F%2Fmedia.digitaltrends.com%2F> > - Shop for the latest > products<http://ca.rd.yahoo.com/ca/tech/digitaltrends/SIG=11931veu7/**http%3A%2F%2Fshop.digitaltrends.com%2F> > > At the SyScan security conference being held in Singapore this week, > Macintosh security expert Charlie Miller has outlined an SMS-based > vulnerability in the Apple iPhone that could let attackers listen in on > calls, access the GPS unit to locate the phone, execute arbitrary programs, > and even let the phone participate in distributed denial-of-service (DDOS) > attacks against other Internet sites via the Internet. > > Miller didn't go into significant detail on the exploit, although he > planned to discuss the possible attack in greater detail at the Black Hat > security conference later this month in Las Vegas, Nevada. Apple is expected > to offer a patch for the vulnerability before then. > > The vulnerability enables attackers to send a program to the iPhone-140 > bytes at a time via SMS-which the iPhone then executes as its root user with > no interaction or confirmation required from the iPhone's owner. In theory, > the exploit could be used to access virtually any of the iPhone's functions > or run any program, if enough exploitative SMS messages could be delivered > to the iPhone. > > The exploit serves as an illustration of the potential pitfalls of ever > more-sophisticated mobile devices: as users are increasingly isolated from > the fundamentals of the technologies they're using, they often have no way > to know whether their devices or personal information are vulnerable or have > been compromised. > > ------------------------------ > Looking for the perfect gift?* Give the gift of > Flickr!*<http://www.flickr.com/gift/> > -- Martin Pham Dinh [email protected] http://martinphamdinh.googlepages.com/
