Page 1 of 2 12 LastLast
Results 1 to 20 of 25

Your favorite Apple, iPhone, iPad, iOS, Jailbreak, and Cydia site.


Thread: iPhone Hack Attacks Could Define 2010

  1. #1
    MMi Staff Writer Michael Essany's Avatar
    Join Date
    Aug 2009
    Location
    Valparaiso, Indiana
    Posts
    3,846
    Thanks
    17
    Thanked 1,481 Times in 567 Posts

    Default iPhone Hack Attacks Could Define 2010


    Roel Schouwenberg, a senior malware researcher at Kaspersky Lab Americas, is presenting a startling prediction for 2010. As highlighted today on 24/7 Wallstreet, Google Wave, the iPhone and Android could sustain heavy cyber attacks next year.

    Schouwenberg predicts that hackers will make major assaults on the Apple iPhone and handsets running the Google Android operating system beginning in 2010. “The first malicious programs for these mobile platforms appeared in 2009, a sure sign that they have aroused the interest of cybercriminals.”
    Although the iPhone could face substantial threats, Schouwenberg postulates that Google Wave will probably be the biggest target of cyber criminals. And he says attacks will "no doubt" follow a familiar pattern - spam will be sent, phishing attacks will be attempted, and then the exploiting of vulnerabilities will take place as malware spreads deeper into once "safe territory."

    Software security has become a multi-billion industry, particularly protecting Microsoft products. McAfee (NYSE:MFE) and Symantec (NASDAQ:SYMC), the two largest software security companies, had $8 billion in revenue between them last year. But, the PC and server worlds are still awash in spam, phishing attacks, and malware problems. The best that can be said about the two software security firms and their competitors is that the problems are not worse than they are already.
    Strangely enough, Schowenberg says the competition among search engines like Google, Microsoft Bing, and Yahoo will heavily contribute to the rise in "cyber terrorism" in the months and years to come. As the search engines endeavor to incorporate Facebook and Twitter posts in search results, cyber criminals will have an easier time deploying "phishing scams, banking Trojans and cutting-edge intrusions."

    Even though Schouwenberg may be a little too "gloom and doom" for most, it stands to reason that as smartphones and mobile technologies become more sophisticated, so too will the hackers and their devious plots to exploit vulnerabilities - of which there are obviously more today than ever.

    That still leaves one of the primary purposes for malicious hacking which is simply to cause chaos. A software expert decides to disrupt a large technology ecosystem because he can. As Alfred said in the Batman movie “The Dark Knight”, “… some men aren’t looking for anything logical, like money. They can’t be bought, bullied, reasoned or negotiated with. Some men just want to watch the world burn.” The iPhone OSX and Android operating systems are vulnerable because they are popular and there may not be any comprehensive defense against that.
    Image via TechDigest

  2. The Following User Says Thank You to Michael Essany For This Useful Post:

    reaves205 (12-30-2009)

  3. #2
    CHUCK-TASTIC battlecrushr's Avatar
    Join Date
    Jun 2009
    Location
    Houston follow @al_da_beast
    Posts
    7,940
    Thanks
    273
    Thanked 1,034 Times in 956 Posts

    Wow. Guess I need fond out how to use firewall ip

  4. #3
    I got exactly the same keyboard as in the first post!

  5. #4
    My iPhone is a Part of Me luvmytj's Avatar
    Join Date
    Jul 2008
    Location
    New York
    Posts
    703
    Thanks
    32
    Thanked 75 Times in 61 Posts

    Quote Originally Posted by jdys_1991 View Post
    I got exactly the same keyboard as in the first post!
    So why are you wearing the mask & gloves? LOL

  6. #5
    Quote Originally Posted by battlecrushr View Post
    Wow. Guess I need fond out how to use firewall ip
    Will this help? I need to get it if soo

  7. #6
    iPhone? More like MyPhone nrowensby's Avatar
    Join Date
    Mar 2008
    Location
    Columbia, SC
    Posts
    156
    Thanks
    24
    Thanked 22 Times in 16 Posts

    Quote Originally Posted by jdys_1991 View Post
    I got exactly the same keyboard as in the first post!
    Me too... at least at work, I do

  8. #7
    "Wow. Guess I need fond out how to use firewall ip"


    i second that

  9. #8
    Livin the iPhone Life tudtran's Avatar
    Join Date
    Sep 2007
    Location
    Foco, Colorado
    Posts
    1,004
    Thanks
    4
    Thanked 39 Times in 30 Posts

    F**kers.

  10. #9
    My iPhone is a Part of Me JAG2621's Avatar
    Join Date
    Jan 2008
    Location
    Alabama
    Posts
    510
    Thanks
    20
    Thanked 58 Times in 45 Posts

    They are just saying attempts will be made but not how they will be made. We will have to wait and find that out when the time comes but the first thing to do is change the root password on your iPhone. Firewall IP will be a good app to help defend the threats also. But as stated in the case of the Rick Astley worm and open ssh changing the root password is a must!

    To change root password,

    1: Install MobileTerminal Package
    MobileTerminal Package

    2: Run MobileTerminal

    This program will be on your SpringBoard called "Terminal".

    3: Obtain Administrator Access

    Run "su root" and provide the root password. The default password as provided by Apple is "alpine".

    4: Change the root Password

    Run "passwd" and type in your new password twice. Please note that your keypresses will not be displayed on the terminal screen (for security).
    iPhone:~ root# passwd
    Changing password for root.
    New password:
    Retype new password:
    iPhone:~ root#
    Last edited by JAG2621; 12-30-2009 at 11:30 AM.
    If anything was usefull a thanks would be great!

  11. The Following 5 Users Say Thank You to JAG2621 For This Useful Post:

    96hondaex (12-30-2009), emendonca79 (01-19-2010), kevin.e.white (12-30-2009), steveathome (01-02-2010), T0tall3d (12-31-2009)

  12. #10
    iPhone? More like MyPhone kevin.e.white's Avatar
    Join Date
    Dec 2008
    Location
    U.K.
    Posts
    258
    Thanks
    336
    Thanked 129 Times in 104 Posts

    thanks jag, opening terminal as i type.

  13. #11
    Quote Originally Posted by JAG2621 View Post
    They are just saying attempts will be made but not how they will be made. We will have to wait and find that out when the time comes but the first thing to do is change the root password on your iPhone. Firewall IP will be a good app to help defend the threats also. But as stated in the case of the Rick Astley worm and open ssh changing the root password is a must!.........
    Then (or) turn off SSH using SBSettings........

  14. #12
    CHUCK-TASTIC battlecrushr's Avatar
    Join Date
    Jun 2009
    Location
    Houston follow @al_da_beast
    Posts
    7,940
    Thanks
    273
    Thanked 1,034 Times in 956 Posts

    But in some cases havin ssh on all the time I's positive

  15. #13
    iPhone? More like MyPhone kevin.e.white's Avatar
    Join Date
    Dec 2008
    Location
    U.K.
    Posts
    258
    Thanks
    336
    Thanked 129 Times in 104 Posts

    i forget almost all the time to turn it off.

  16. #14
    iPhone? More like MyPhone ifonemaniac's Avatar
    Join Date
    Sep 2008
    Location
    U.S.
    Posts
    165
    Thanks
    31
    Thanked 22 Times in 16 Posts

    Quote Originally Posted by Messany View Post
    As Alfred said in the Batman movie “The Dark Knight”, “… some men aren’t looking for anything logical, like money. They can’t be bought, bullied, reasoned or negotiated with. Some men just want to watch the world burn.”
    Quoting a quote there. The men that can't be bought, bullied, reasoned or negotiated with... are the men that need to be killed.

  17. #15
    My iPhone is a Part of Me JAG2621's Avatar
    Join Date
    Jan 2008
    Location
    Alabama
    Posts
    510
    Thanks
    20
    Thanked 58 Times in 45 Posts

    Quote Originally Posted by jayson9 View Post
    Then (or) turn off SSH using SBSettings........



    Just don't forget! But if you change the root password it does not matter!
    Last edited by JAG2621; 12-30-2009 at 12:04 PM.
    If anything was usefull a thanks would be great!

  18. #16
    iPhoneaholic plcrules's Avatar
    Join Date
    Dec 2008
    Location
    New York, New York
    Posts
    380
    Thanks
    40
    Thanked 25 Times in 16 Posts

    the sad thing is that they could use the same exploits needed 2 jailbreak so apple will boost up security and win we finally figure out how 2 jailbreak more viruses

  19. #17
    Don't forget to change the mobile password too
    1) type passwd at mobiletermianl and change (you'll have to type alpine as old password).
    This is often overlooked - you're data is all owned and accessible by the "mobile" user. (Which is why the RockApp prompts you for this change as many users don't know about the security compromise by not changing this passwd).
    Send iPhone System Log: Via any Intelliborn App -> Click Help / FAQs/ Support -> Scroll to bottom and click on red text at bottom.
    MyWi 4.0 - WiFi + USB Tethering on 3.x/4.x/5.x + Simple WiFi Router - Connect Laptops, Touches, + more!
    My3G - Facetime over 3G plus HiDef YouTube and more! Trick your iPhone into thinking it's on WiFi
    IntelliScreenX - iOS 5 Notification Center the way Apple wished it was.
    Tlert - View and Reply to SMS message within any app. Get rid of the ugly default alert messages!

  20. #18
    I agree with shutting off SSH through SBSettings or whatever you have. If you can brute force SSH normally, I'm sure it can be done to an iPhone. Yes, changing the password will help, but I'm sure there will be a way to bruteforce the password if someone really really wants to. So, just shut it off. safest thing to do.

  21. #19
    Back when I had my 3G, I never had SSH installed. When I went into my file system it was easiest to do via USB. Wasn't really aware people used SSH more. Glad I don't have to worry about iPhone hacks anymore though. Haha.

  22. #20
    Lol, SSH isn't the only way someone could attack the iPhone. I'm sure there are other exploits that can be done over the network without having to go through SSH. If it can be done, it will be done. haha. IMO it would be sick if someone made something that monitored all incoming and outgoing connections and asked the users permission to allow or deny those connections. Or is that what Firewall IP does? (haven't used it). So... if iPhone attacks really do get serious, just turning off SSH probably won't help that much. but hopefully they don't get that far

Page 1 of 2 12 LastLast
Posting Permissions
  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •