MacBook hacker reveals potential iPhone security hole
The researcher responsible for hacking the MacBook in seconds tells of a potential way to break into the iPhone.
Miller claimed that shellcode could be run from the command line of the latest version (2.2.1) of the iPhone operating system. This allows access to the entire file system to run hundreds of different commands.
This was possible on the first version of the iPhone, but it was thought that the latest version of the software was strong enough to prevent this.
Mac security company Intego's blog said that Miller's revelation was currently just a warning, and that an exploit still needed to be written to take advantage of the flaw.
It said: "Mac OS X can run shellcode in fact, many trojan horses exploit this ability but this is an inherent part of the operating system.
"The real issue is exploits that may be able to launch this code on an iPhone, and we're waiting for those to arise."
The whole talk can be found here.
Successful digital transformations are future ready - now
Research findings identify key ingredients to complete your transformation journeyDownload now
Cyber security for accountants
3 ways to protect yourself and your clients onlineDownload now
The future of database administrators in the era of the autonomous database
Autonomous databases are here. So who needs database administrators anymore?Download now
The IT expert’s guide to AI and content management
Your guide to the biggest opportunities for IT teams when it comes to AI and content managementDownload now