haha, c'est pour demontrer aux ardents defenseurs de Mac et Linux que 
les arguments disant que le systeme Windows est plus ci plus ca ne sont pas 
necessairement vrais.




________________________________
From: Martin Pham Dinh <[email protected]>
To: [email protected]
Sent: Sunday, July 5, 2009 1:13:39 AM
Subject: URG-L: discussion non medicale: une fois populaire, des failles 
deviennent interessantes

Il n'y a pas de plateforme invulnérable. Ce n'est qu'une question d'interet. 
Les hackers s'interessent à Windows parce que le "marché" est le plus 
important. Eventuellement par contre, il y aura plus de smartphone dans le 
monde que de PC...et le Iphone est le leader actuel de ce segment. 


On Sun, Jul 5, 2009 at 12:34 AM, Kenneth Chen <[email protected]> wrote:

Tenez, avec la popularite des iPhones, on commence a s'interesser plus a leurs 
failles...
>
>http://ca.tech.yahoo.com/cell_phones/accessories/digital_trends/article/3696
>Mac Security Expert Identifies iPhone SMS Vulnerability
>More from Digital Trends
>       * Digital Trends Home
>       * Reviews
>       * News
>       * Videos
>       * Shop for the latest products 
>At the SyScan security conference being held in Singapore this week, Macintosh 
>security expert Charlie Miller has outlined an SMS-based vulnerability in the 
>Apple iPhone that could let attackers listen in on calls, access the GPS unit 
>to locate the phone, execute arbitrary programs, and even let the phone 
>participate in distributed denial-of-service (DDOS) attacks against other 
>Internet sites via the Internet. 
>Miller didn't go into significant detail on the exploit, although he planned 
>to discuss the possible attack in greater detail at the Black Hat security 
>conference later this month in Las Vegas, Nevada. Apple is expected to offer a 
>patch for the vulnerability before then.
>The vulnerability enables attackers to send a program to the iPhone-140 bytes 
>at a time via SMS-which the iPhone then executes as its root user with no 
>interaction or confirmation required from the iPhone's owner. In theory, the 
>exploit could be used to access virtually any of the iPhone's functions or run 
>any program, if enough exploitative SMS messages could be delivered to the 
>iPhone.
>The exploit serves as an illustration of the potential pitfalls of ever 
>more-sophisticated mobile devices: as users are increasingly isolated from the 
>fundamentals of the technologies they're using, they often have no way to know 
>whether their devices or personal information are vulnerable or have been 
>compromised. 
>________________________________
Looking for the perfect gift?Give the gift of Flickr!


-- 
Martin Pham Dinh
[email protected]
http://martinphamdinh.googlepages.com/



      __________________________________________________________________
Yahoo! Canada Toolbar: Search from anywhere on the web, and bookmark your 
favourite sites. Download it now
http://ca.toolbar.yahoo.com.

Répondre à