***snippet***
link please?
Besides, it's been reported that Apple paid them to do this anyway.
link please?
Besides, it's been reported that Apple paid them to do this anyway.
It's kind of the purpose of the NYT and news organizations to inform people. I'd be much more critical of the Times if they didn't report this. It's important to know if insecurities exist so you can behave accordingly. It's also important for potential buyers to weigh the risks of a purchase.2. The NYT and media on the whole will misreport and exaggerate stories luke this to generate fear and negative buzz about the most hyped consumer electronic device of this century.
In the same breath you're criticizing the company for not promoting other flaws found and then criticizing them for promoting this one... Of course they're promoting their work here, that's what companies do-- otherwise people look at their websites and say "they don't seem to have done anything"... If they're a new group and this is the first they've done, there's all the more reason to try and get their name out there. This doesn't suggest their claims are invalid at all...So, I'm looking on the website, looking for other examples of exploits exhibiting this companies work....and I'm not seeing it. I see a couple of blurbs from CEO's and mission statements...but no other exploits that this company has found.
Strikes me that this company is using the iPhone and this 'so called' flaw as a vehicle for cheap self promotion.
If being able to extract all of your personal details and potentially be able to initiate calls isn't significant, what *do* you consider a significant flaw?Everyone knows that Apple and their products are not perfect. There is just no flaw that is so significant that it would merit this type of attention.
I was thinking the same thing, but this doesn't look like it's a legitimate 2.0 app-- rather it's crashing Safari and executing native code. If you provide a native code dev kit, you're just making this kind of attack that much easier. If Safari were more stable, it would act as a reasonable firewall from the underlying system-- which is what web based apps are meant to do.This is the reason I am personally opposed to Apple doing web 2.0 apps.They are asking for trouble with this vulnerability being web based.Put out a iPhone Dev kit Apple !!..
I read the article and the PDF. I would say they do not come across as particularly anti-Apple. However, they do come across as particularly touting a Microsoft party line.
The claim the reason Apple's Mac OS X is more secure (when compared to Windows)i s only because it is on fewer computers. While there may be some truth to that as a factor, that's a sentiment that directly reflect Microsoft's propaganda campaign and its' touted without any qualification. The article also mentions add-on style security measures similar to those used by Microsoft and doesn't mention other sensible security-by-design steps that Apple does take (at least on the desktop), that make these other measure less important.
They are [touting the Microsoft party line]?
Do you know for a fact that they are wrong in making such a claim? No you do not. So how can you question their claims, since you do not have any hard facts to back up your own viewpoint?
So they and Microsoft share a common viewpoint on some issue, it automatically means that "they are touting Microsoft's party-line!"? By same logic: since Hitler was a vegetarian, and Steve Jobs doesn't eat meat either, does that mean that SJ is "touting Hitler's party-line"?
Well, in recent years Microsoft HAS been improving the security of their software at the design-level as well, as opposed to just bolting on firewalls and antivirus-tools.
So, I imagine they found some vulnerabilities. However, often times the tactic is to tout these huge security holes which hit the press hard. Then in a month when it comes time to put-up or shut-up, the press has already forgotten about he whole ordeal and the PR hitmen, can simply slink back into their hole.
So you are saying that their findings are genuine? So what are you complaining about then? Because they make Apple look bad? because they said something partially unrelated that you disagree with?
Finally, the last claim seems to be a big tipoff If they're actually injecting javascript code to use as a audio-recorder and sending voice over the network connection as an exploit (a javascript exploit), why don't they ship these apps, because their are a lot of iPhone users who have been clamoring for these features.
***snippet***
link please?
If being able to extract all of your personal details and potentially be able to initiate calls isn't significant, what *do* you consider a significant flaw?
Everyone knows that Apple and their products are not perfect. There is just no flaw that is so significant that it would merit this type of attention.
In this society, the only thing people like to see more than a company reaching it's zenith, is to see it fall.
Every computer in the world faces this type of threat if you go to a bad website of click on the wrong link. What's new about this besides the fact that it can now be done on an iPhone?
And it's a big deal whenever either of those scenarios are discovered. People concerned about Windows security are mostly concerned about exactly these kinds of problems.Every computer in the world faces this type of threat if you go to a bad website of click on the wrong link. What's new about this besides the fact that it can now be done on an iPhone?
The government has the ability and the right to turn on your cell receiver or initiate a call if they want.
Firefox isn't impervious either...Hardly! Maybe only computers running Safari, it is trivial for me to protect myself from this with Firefox. What's different is that you have been locked out of any ability to control the security of the phone and any exploited iPhone is a potential danger to the network it joins.
Good advice. Apple should have file vault enabled on the iPhone as well...Earlier I said Apple should be embarrassed about Safari crashing exploits. That's true. However, I should add that exploits involved with using WiFi hotspots are always there: monkey in the middle exploits. That's why it's a good idea to use SSL for email, VPN for other confidential information and more ubiquitous use of trust certificates would improve things in that situation. That is the monkey in the middle would be able to intercept all your data, but it would do them no good without the decryption keys.
Besides, it's been reported that Apple paid them to do this anyway.
....
Apple knew about this last week; seems like an established relationship to me.
The Drudge Report is biased ?! what a shocker.![]()
The Drudge Report is biased ?! what a shocker.![]()
I heard it on WTOP news (www.wtop.com) this morning on my way to work, but I can't find anything posted on their website.
However, I did find this comment:
"These weaknesses allow for the easy development of stable exploit code once a vulnerability is discovered," the researchers wrote in a whitepaper. They said they were unwilling to divulge any more details about the exploits until the Black Hat security conference in Las Vegas in August, because Apple was only notified of their research findings on 17 July.
http://news.zdnet.co.uk/security/0,1000000189,39288165,00.htm
Apple knew about this last week; seems like an established relationship to me.
Of course, according to these forums, any publication is automatically 'Apple haters' because they 'dare' to publish a single negative Apple article.
However, there are serious problems with the design and implementation of security on the iPhone. The most glaring is that all processes of interest run with administrative privileges.
Independent Security Evaluators has a sparse website. No mention of exactly what they do, or how they make a profit. (Microsoft payments?) They are all of 2 years old. Would you take security advice from a 2 year old?
I guess this is a side effect of apple's triple-platform-safari strategy. Apple apparently needs to put more effort into safari's security.
There are some kind of damning points from a security perspective. There is no way that Apple should have written every app with admin privileges. That's just stupid.
...and all my information is backed up.![]()