📅 February 4, 2010

SpyPhone: Demo Of Malware Spread Through Appstore At Black Hat Conference

You would only have to launch the app once, and the hacker has access to your Safari’s history, last GPS position recorded , keyboard’s cache, email inbox, everything.

A couple of days ago we told you that this year, the Black Hat conference is all about iPhone apps malware. Following up the story, Nicolas Seriot, a Swiss expert, has created an iPhone app called SpyPhone in order to demonstrate exactly how easy it is to spread malware through the App Store, and compromise the security of our data on the iPhone.

Continue reading “SpyPhone: Demo Of Malware Spread Through Appstore At Black Hat Conference”

📅 February 2, 2010

iPhone Apps Malware Is The Focus Of This Year’s Black Hat Conference

a simple iPhone app is able to store your email address, phone number, keyboard’s cache, WiFi connections and the most recent GPS positions

From Jan. 31 to Feb. 3. is being held in Arlington, Va., this year’s Black Hat conference which unites the best hackers around the world who are committed to pierce the systems in order to enable organizations to improve the safety of their devices. This year they are giving much importance to the iPhone and its AppStore and other platforms such as Andorid. Their focus: malware.

Continue reading “iPhone Apps Malware Is The Focus Of This Year’s Black Hat Conference”

📅 July 31, 2009

Charlie Miller Explains The Vulnerability of the iPhone And The Possibility of Being Hacked via SMS

Just as we had anticipated, Charlie Miller and Collin Mulliner, during the Black Hat Conference, spoke about the iPhone vulnerability, which can be easily hack through the SMS application.

Yesterday , FSMdotCOM told you to Pay Attention To SMS Messages Received After Thrusday 07.30.09. Your iPhone Might Get Hijacked . Just as we had anticipated, Charlie Miller and Collin Mulliner, during the Black Hat Conference, spoke about the iPhone vulnerability, which can be easily hack through the SMS application.
Continue reading “Charlie Miller Explains The Vulnerability of the iPhone And The Possibility of Being Hacked via SMS”