iPhone Trojan Sign of Things to Come? 151
climber writes "Just days after the first scareware for OSX, researchers are pondering the problems of an iPhone exploit that could lead to larger issues. The Trojan pulls legitimate apps off the phone if you try to remove it, but it only infects iPhones that have 'been modified or opened through a security hole in the system.' Though this worm is more of an annoyance than anything else, it could be a proof of concept for a more serious attack. 'The fear is hackers may be experimenting and gathering research that will increase the dangers of a more malicious attack in the near future. It is clear at least one writer -- the author of this piece at Web Worker Daily -- thinks that the iPhone should be left on the dresser in the morning. She offers several reasons that the device isn't a good corporate tool.'"
What rock was she hiding under? (Score:5, Insightful)
It's not even a *bad* corporate tool. It's a consumer device and was never meant (in its current incarnation) to be used for corporate uses. You can't even get one if your AT&T number is registered via a business account. It's like saying "this plum isn't a very good orange."
Idiot.
Re:What rock was she hiding under? (Score:4, Funny)
Re: (Score:2, Funny)
It's not even a *bad* corporate tool. It's a consumer device and was never meant (in its current incarnation) to be used for corporate uses. You can't even get one if your AT&T number is registered via a business account. It's like saying "this plum isn't a very good orange."
I don't know about your world, but in my world I use what I buy wherever I want, without permission from corporate overlords who insist my device is only for specific purposes.
It's like saying "this plum isn't a very good ora
Re: (Score:2)
Of course I didn't RTFA, but I would guess is that they meant it shouldn't replace a crackberry as the standard corporate multifunction tool.
A corporation may not tell you what to use and where (although they can and do), but try taking it into a courtroom or other "sensitive" area and you will quickly find out that you cannot use wh
Re: (Score:3, Funny)
Re:What rock was she hiding under? (Score:5, Funny)
It's a consumer device and was never meant (in its current incarnation) to be used for corporate uses.
Also, it does not toast my bread AT ALL evenly. I am sorely disappointed with my purchase!
Also, what does that link have to do with the rest of the summary?
Ah, the virus-proof apple. (Score:2, Interesting)
Re: (Score:3, Funny)
Re:What rock was she hiding under? (Score:4, Interesting)
True, but even so, many executives have bought iPhones and ordered their reluctant IT dept. to support them. When the big boss speaks, most underlings do listen and try to please him/her. So, IT folks out there, you might as well figure on supporting the iPhone, even if Apple doesn't market it for corporate users. The big boss may come in sooner than you figure and DEMAND support for his/her shiny new iPhone.
Re: (Score:3, Insightful)
Re:What rock was she hiding under? (Score:4, Insightful)
But isn't that the fun and interesting part of an IT job. Coming up with clever solutions that others have not already thought of and pre-chewed and partially digested is what makes the life of a real engineer challenging and fun. This includes supporting Windows, possibly in ways and with methods the folks in Redmond have not even dreamed up yet.
Re: (Score:2)
Re: (Score:3, Interesting)
Whenever someone comes to me with that sort of demand, I tell 'em I'll be glad to support it, whenever they buy the software/hardware appliance/developers license/whatever that I'll need to run to support it. And I am happy to do that, because that does fall under the realm of things that I can do, unlike waving the magic compatibility wand and recoding interfaces to support a platform that only just released a real
Re:What rock was she hiding under? (Score:5, Interesting)
It uses standard IMAP, with support for SSL.. Standard SMTP with support for TLS...
It can even VPN, using standard l2tp/ipsec.
You don't need any additional software, assuming you're running systems that support the appropriate standards. Yes, the iphone does have some shortcomings but being a hassle to support is not one of them. It's just a case of people being scared of what they don't know.
Re: (Score:3, Informative)
Maybe the iPhone is easier if your corporation is less than 10 users and John is your trusted IT guy. Do that many companies really allow direct access to POP/IMAP/SMTP from the random internet to the corporate email system? You can fire up Thunderbird and connect to your companies email? Not a single place that I've worked has done that. Really.
One person can maintain thousands of crackber
Re: (Score:2)
The iphone will work with virtually any existing mail server that supports imap, preferably with SSL.
As to putting smtp directly on the net, everyone does that, that's how you receive mail from the outside.
Putting imap directly on the net perhaps not, but as i said in the original post you can vpn... Even so, imap over ssl is no less secure than an https based webmail syste
Re: (Score:2)
The iphone will work with virtually any existing mail server that supports imap, preferably with SSL."
The point is that plain IMAP just doesn't cut it for corporate use. The place I work at uses Domino with BES, just about anything you can do in notes can be done on the blackberry. Can plain IMAP also handle syncing contacts and calendar entries?
If something like Blackberr
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Most director level and higher execs are rather hidebound. They don't rush out and grab the latest thing unless t
Re: (Score:2, Funny)
Although I suppose I know a lot more people who in fact _are_ good corporate tools, so I guess it all balances out in the end.....
Re: (Score:2, Interesting)
I am by no means Mac user, but I have to admire their creation of the Macbook Air. Here's another example where they said - here's the problem, people traveling - lets create something to make this process easier. This is really one
Re: (Score:2, Insightful)
You're right, but if you look at the reasons, most of them apply to a consumer device, too. (e.g. Lack of encryption is pretty wacked. The only reason Apple gets away with that in the market, is that their competitors are just as bad.)
One of the big lessons of the iPhone is that today's phones suck. The iPhone sucks too. But the iPhone -- a device made by a personal computer maker -- has also sent a message that wasn't being heard before: phones don't have to suck. If PCs can be make non-sucky, why no
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Also, I can't be sure, but I *think* the iPhone can charge off an iPod cable. There are no shor
Re: (Score:3, Interesting)
I am a die hard Linux user who generally hates Microsoft products, but I could not wait for the Google Phone so I bought a Kaise
So FUD... and a non sequitur (Score:5, Insightful)
'The fear is hackers may be experimenting and gathering research that will increase the dangers of a more malicious attack in the near future. It is clear at least one writer -- the author of this piece at Web Worker Daily -- thinks that the iPhone should be left on the dresser in the morning. She offers several reasons that the device isn't a good corporate tool.'
So the summary starts off being nothing more than FUD, and since that won't hold water descends quickly -- albeit nonsensically -- into a completely different topic.
I guess Zonk hates the iPhone. Or is looking for page views. Or something. *shrug* Whatever, none of this makes a lick of sense.
"dangers of a more malicious attack" (Score:5, Insightful)
No kidding. News flash: If the iPhone is vulnerable, then the "dangers of a more malicious attack" are already there. The solution is to fix the iPhone, not to bitch and fearmonger about "hackers ... experimenting and gathering research".
Re:"dangers of a more malicious attack" (Score:4, Insightful)
Re: (Score:3, Informative)
Of course, people who hack it to hell and then don't ever upgrade again (in fear of bricking or whatever), their phones can't be fixed by their own actions.
Re: (Score:3, Informative)
Re: (Score:1)
So the summary starts off being nothing more than FUD, and since that won't hold water descends quickly -- albeit nonsensically -- into a completely different topic.
Well, the second topic does make some sense as it shows that the writer of the article is someone with an obvious iPhone-hating bias.
Still, the iPhone is a consumer product, not an enterprise tool, and even Apple itself markets it that way. That's why it doesn't have any of the features she mentions as being lacking in the iPhone. And there's nothing wrong with that. As a personal communications tool for consumer use, it's fine. As a corporate enterprise tool, it sucks.
Maybe Apple will come out with a
Re:So FUD... and a non sequitur (Score:5, Interesting)
The only known actual exploit on the iPhone is the TIFF exploit that JailBreakMe.com uses for powers of good (which, while jailbreaking the phone, also patches the exploit it used to do so). People that didn't use that hack likely updated to 1.1.2 firmware, which also patches that hole.
No, it's (most irrelevantly) not a corporate blackberry replacement. It's not really perfect at anything, though I'll say that the solitaire game really lends it self fantastically to the touch interface. But unlike most multifunction devices which really half-ass everything, it does most things quite well and the sacrifices made are understandable and more importantly are not deal-breakers.
*Hey, I'm a stranger on the internet. What did you expect, candy?
Re: (Score:2)
Damn you!!
Re: (Score:2)
1) Jailbreak your iPhone
2) Add standard third-party sources
3) Download and install specific, known good third-party applications (the BSD subsystem and a few misc utils by Erica Sadun, I believe)
4) Manually add a third-party application XML feed (typing in the feed address by hand, as it's not listed under third party sources)
5) Find and download this appl
Re: (Score:2)
The fear is hackers may be experimenting and gathering research that will increase the dangers of a more malicious attack in the near future.
That is a pretty murky statement, much like something a psychic would say.
Re: (Score:2)
??? Do you read at +5 or something? Since I've started using the new discussion system, I have had to read at -1 (apparently filtering doesn't work?), I am going to tell you, you are giving the slashdot user base too much credit.
I am seriously thinking of going back to the old discussion system just so I don't have to sift through all the troll / clueless / shill comments. Then again it would be ni
Stuffed shirts (Score:2, Insightful)
Re:Stuffed shirts (Score:5, Informative)
I'm a huge advocate of personal freedom, but on an enterprise-class mobile device, support for centraly managed policy is a MUST to comply with HIPAA, SOX, etc.
1984 does not apply to a corporate environment, sorry.
Re: (Score:2, Insightful)
You do realize that in many (most?) cases, we are mandated by law to protect our information on mobile devices with passwords/encryption?
Yes. You do realize the FCC already checked to make sure that Apple was following the law [computerworld.com], right?
Ok. I was just checking. Look- if your employees buy an iPhone and bring it to work, you don't have to support them joining the buisness network. If they complain, tell them that the company didn't furnish them with an iPhone and it was their personal telecommunications purchase decision. You sound like Apple should be sued for releasing a phone that was intended for personal use just because people decide
Re: (Score:2)
When I said "we are mandated by law," I was speaking as a corporate IT worker, and not as an individual.
I was replying to a poster who was comparing IT security with the book 1984. There was no intent that anyone take it as anything but a statement saying that we really can't legally use iphones in that environment as they do not meet the minimum requirements that we must take to protect our data.
Re: (Score:2)
Re: (Score:2)
Also, I don't think you can brick the thing via centralized management, which is often a necessity for corporate devices.
Re: (Score:2)
You mean the dictates of Minihealth and Minifinance? Like I said, I hope Apple's the wrong company.
trojans (Score:5, Funny)
yes, but (Score:5, Funny)
That's a problem I always had as a teenager. It was easy to keep a condom in your wallet, but the banana got squishy after a couple of days and made an embarrassing mess.
Curious (Score:5, Interesting)
Re: (Score:1)
Re: (Score:3, Interesting)
And of course, in the course of those six months, there are some people who have NOT patched their system against these vulnerabilities.
Re: (Score:2)
The people writing the exploits. No one else benefits.
The "unlocking" is done through a buffer overflow vulnerability, which by definition is a security hole. If you've avoided the latest software updates because it "breaks" unlocking, what you're doing is avoiding the patch that "fixes" security.
So yes, if you intentionally leave security vulnerabilities open in your computers, then intentionally install this software (it
Re: (Score:1)
You can always buy a Nokia...
Re: (Score:3, Interesting)
Sorry... I'm a UI designer, and posts like this almost make me froth at the mouth.
Re: (Score:3, Insightful)
There is of course an easy solution to the virus problem. Apply the damn patch, and if you want an open device you can play around with don't buy an iPhone in the first place!
Re: (Score:2)
Re: (Score:2)
I'm glad we agree that AT&T doesn't benefit. Viruses on AT&T iPhones does NOT benefit AT&T, its investment in the iPhon
Who do you trust? (Score:2)
That is a clever spin to put on a story whose moral is that you should download software only from sources you trust. The unknown hacker who unblocked your phone isn't always your friend-in-need.
Somewhat off-topic, but has it occurred to anyone here that services like Steam and XBox Live! are the models for trusted repositories of Windows software? That the "Linux advantage" of Click-And-Run could be very short-lived?
Wrong (Score:5, Insightful)
Anything that starts with "replace the firmware of your device with this hacked firmware" can obviously cause you problems.
Re: (Score:1)
Isn't that what Linux advocates have been asking Windows users to do for years.
I best duck now, but the analogy is the same.
Re: (Score:2)
Not at all.
Linux isn't a firmware. So the "analogy" you have dies before it even stands up. If you fixed your statement to "replace the OS of your device with this hacked OS", that would still be wrong (assuming the popular usage of the word hacked). Linux isn't "hacked" windows. It's something completely different. The two might be of the same software phylum (os), but they have are o
Re: (Score:2)
Anything that starts with "replace the firmware of your device with this hacked firmware" can obviously cause you problems.
I guess the idea is that the Apple Lockdown Experience that denies rightful owners of the iPhone the ability to run whatever code they wish specifically encourages hacks to open them up, and that these hacks are not inherantly secure so a malicious person can exploit it to their ends.
You can either lock the door and have your bad guys force themselves in or you could open it to the public and put a bouncer there to keep trouble out and give the kids what they want.
I reckon the SDK next month will pretty mu
I'm sure a Windows Mobile phone is more secure (Score:3, Insightful)
If you think the Windows desktop/server security is bad you should see the Windows CE security! Again, MS have delivered an OS that was designed for a disconnected system (PDA) then tried to put a crappy fence around it to make it secure in a connected world. Too little, too late.
As for trojans, well no matter what OS you run, a dumb enough user with sufficient priviledges can always run a trojan. Nothing new here!
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
If the windows mobile platform is so insecure how come the media haven't
Doesn't this only support Apple's position? (Score:5, Insightful)
Since the very beginning, Apple has told people not to hack the iPhone because it could endanger the functionality and security of the device. Those who did could suffer when Apple updated the firmware. Now it appears hackers have found a way to compromise the iPhone because it had been already been compromised. By the way, the first hack into the iPhone require physical access to the phone so it's not like you surfing in your coffee shop will get you a Trojan. Someone first has to steal your phone and then hack it for this Trojan to work remotely.
Re: (Score:2)
Re: (Score:2)
Of course, this is true for say
Re: (Score:2)
Dresser (Score:5, Insightful)
From the linked article I will have to take the Web Worker Daily's word for it though, since I don't feel like ponying up $279 for a 6 page pdf.
Re: (Score:3, Insightful)
Attack of the Weasels (Score:4, Insightful)
Re: (Score:2)
YAWN (Score:2)
Ah, so the exploit means you should not use your iPhone at all.
Oh, BTW, here's her little rant about how she thinks the iPhone is bad for business users. Not that it has any relation to the topic of iPhone exploits, just that she has you attention with a scaremongering article about iPh
Ipod Touch (Score:1)
She is right (Score:3, Funny)
like a worm on a hook (Score:2, Insightful)
Re: (Score:2)
The old "security by obscurity" argument (Score:2)
Oh yes, the tired old "security by obscurity" meme. Hasn't that been put to sleep as yet? OS X has been popular enough to have gained public mindshare and attract the attention of malware writers for some time now, and has attained a market share of about 8%. Why isn't it accounting for 8% of all infections? If it wer
Sad or what ? (Score:2)
Poor, sad woman. Chuck your Crackberry in the bin and go on a long holiday.
Re: (Score:2)
Re: (Score:2)
Only one of the stories bothers me... (Score:2)
The rest of the stories are all things like "oh my god, the iPhone is vulnerable to social engineering too!". Or "iPhone apps run as root, just like Pocket PC and Palm apps!".
If the guy who submitted this article to Slashdot had the first bloody clue about security he'd have put the metasploit attack on the title and left everything else out.
Firmware/software backup? (Score:2)
I don't have an iPhone, but if I ever acquire a device that complicated, I'd accept malware risks if all I had was some kind of a "device rollback": a way to periodically copy the device's software and firmware state. So once in a blue moon if your device is hosed, you plug in something to upload a previous unhosed state and you're back in business.
If I had mod points... (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
The big mistake IMHO is ... (Score:2)
Oh. And. (Score:4, Insightful)
Re: (Score:2, Funny)
Oblig. Looney Tunes ref. (Score:2)
Dog: "Pipe-Full-O-Fun kit number 7"
Foghorn Leghorn: "We have been flim-flammed!"
Dog: "Yeah! Hoodwinked!"
Re: (Score:2, Funny)
Shame on you for implying that I.. I mean, southern white americans aka rednecks are smart enough to even figure out what an iPhone is!
Re: (Score:2, Funny)
Re:SLASHDOT SUX0RZ (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Re:Love the tags on this story (Score:5, Funny)
Re: (Score:2)