Apple iPhone, iPad Security Vulnerability Revealed

By Reuters  |  Posted 2010-08-04 Email Print this article Print
 
 
 
 
 
 
 

WEBINAR: Event Date: Tues, December 5, 2017 at 1:00 p.m. ET/10:00 a.m. PT

How Real-World Numbers Make the Case for SSDs in the Data Center REGISTER >

Symantec, Lookout and Vupen all reported this week a newly discovered vulnerability in Apple's iPad and iPhone operating system that could allow hackers to take complete control of the devices.

BOSTON, Aug 3 (Reuters) - A newly discovered vulnerability in the software that runs Apple Inc's (NASDAQ:AAPL) iPad and iPhone could allow hackers to enslave the popular mobile devices, three security firms said on Tuesday.

The flaw affects Apple's iOS, which also runs the iPod touch, and could allow hackers to take complete control of a vulnerable device, according to Symantec Corp (NASDAQ:SYMC) as well as privately held Lookout and Vupen.

Apple spokeswoman Natalie Harrison said the company was aware of the report and is investigating.

The vulnerability in Apple's iOS is the latest in a series of security bugs identified in mobile devices over the past week. Security experts at a hacking conference last week pointed out several vulnerabilities in Google Inc's (NASDAQ:GOOG) operating system for mobile phones and tablet PCs.

Mobile devices have become increasingly vulnerable to attack because the software that runs them has gotten far more complex over the past few year, giving the devices many of the same capabilities as personal computers.

"We shouldn't be surprised to see security bugs happen in very complex software," said Kevin Mahaffey, chief technology officer for mobile security firm Lookout.

Attackers would need to trick a user into visiting a website planted with a tainted PDF document before infecting an iPad tablet or iPhone smartphone.

Mahaffey said that he is not aware of any incidents in which criminals have exploited the bug to gain control of an Apple device, but said the electronics maker has yet to offer a remedy to protect against such attacks.

"Everybody -- both good and bad -- knows how it works," he said. (Reporting by Jim Finkle; editing by Andre Grenon and Robert MacMillan)
 

 
 
 
 
 
 
 
 
 
























 
 
 
 
 
 

Submit a Comment

Loading Comments...
























 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date