Archive for 'iPhone Threats'
The belief that “my phone can’t get hacked,” is outdated and dangerous. In fact, smartphones are getting hacked with greater frequency than ever, and mobile security measures are increasingly unable to offer viable protection. As we become more and more dependent on our smartphones and tablets for day-to-day computing and communication, they will become even […]Full Story
To thieves running a muck in the streets, a shiny, $600 iPhone is a pretty enticing item to snatch. So much so that statistics project one in three thefts in the United States involves a smartphone. Stolen mobile devices, on top of monetary loss experienced by the owner, pose major security problems due to how […]Full Story
The text message: the simplest easiest way to communicate with anyone and all within 160 characters per data packet. Texting has really taken over as the prime medium of our entire daily chit chats, reminders, and even formal small talks. And without us really ever realizing when and how, text messages have become keepers of […]Full Story
A security researcher has discovered that any wireless network can pretend to be an AT&T Wi-Fi hot spot and thus lure unsuspecting iPhone users to an untrusted network connection. Samy Kamkar, who created a worm that garnered him a million friends on MySpace overnight in 2005, said in an interview this week that he can […]Full Story
Our previous article titled “Jailbroken iPhones Targeted by New Worm“, highly recommends that all users change their default root password in order to prevent an attacker to take control over the iPhone. Users, who have a jailbroken device and are concerned about worms, should backup their data, and then restore the device to its factory […]Full Story
There’s a new worm that targets jailbroken iPhones running SSH, and still have the iPhone default password. This worm can steal data contained on the iPhone and connect back to the attacker, giving them control over the phone. This worm has the ability to download and install Malware onto the iPhone as well. The root […]Full Story