{"id":4430,"date":"2009-07-30T18:05:04","date_gmt":"2009-07-30T10:05:04","guid":{"rendered":"http:\/\/techielobang.com\/blog\/?p=4430"},"modified":"2009-07-30T18:06:02","modified_gmt":"2009-07-30T10:06:02","slug":"apple-iphone-sms-vulnerable-to-hijack-to-be-publicized-at-black-hat-cybersecurity-conference","status":"publish","type":"post","link":"https:\/\/techielobang.com\/blog\/2009\/07\/30\/apple-iphone-sms-vulnerable-to-hijack-to-be-publicized-at-black-hat-cybersecurity-conference\/","title":{"rendered":"Apple iPhone SMS Vulnerable to Hijack to be publicized at Black Hat Cybersecurity Conference"},"content":{"rendered":"<p>It seems that there is a security flaw on iPhone 3.0 software. According to Charlie Miller, one of the two researchers who identified the flaw, they had already notified Apple about it (about 1 month ago). But it seems that nothing is done (yet). So, they are going to publicize their findings at Black Hat Cybersecurity Conference this Thursday at Las Vegas.<\/p>\n<p style=\"text-align: center;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"4431\" data-permalink=\"https:\/\/techielobang.com\/blog\/2009\/07\/30\/apple-iphone-sms-vulnerable-to-hijack-to-be-publicized-at-black-hat-cybersecurity-conference\/hacking-into-iphone-sms\/\" data-orig-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/07\/hacking-into-iphone-sms.png?fit=320%2C480&amp;ssl=1\" data-orig-size=\"320,480\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"hacking-into-iphone-sms\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/07\/hacking-into-iphone-sms.png?fit=200%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/07\/hacking-into-iphone-sms.png?fit=320%2C480&amp;ssl=1\" class=\"size-full wp-image-4431 aligncenter\" title=\"hacking-into-iphone-sms\" src=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/07\/hacking-into-iphone-sms.png?resize=320%2C480\" alt=\"hacking-into-iphone-sms\" width=\"320\" height=\"480\" srcset=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/07\/hacking-into-iphone-sms.png?w=320&amp;ssl=1 320w, https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2009\/07\/hacking-into-iphone-sms.png?resize=200%2C300&amp;ssl=1 200w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/p>\n<p><!--more-->[ad#boxlist]<\/p>\n<p>According to them,<\/p>\n<blockquote><p>Using a flaw they&#8217;ve found in the iPhone&#8217;s handling of text messages, the researchers say they&#8217;ll demonstrate how to send a series of mostly invisible SMS bursts that can give a hacker complete power over any of the smart phone&#8217;s functions. That includes dialing the phone, visiting Web sites, turning on the device&#8217;s camera and microphone and, most importantly, sending more text messages to further propagate a mass-gadget hijacking.<\/p><\/blockquote>\n<p>So, since they are going to publicize it on Thursday, make sure that you quickly switch off the phone when you receive a SMS with a single square character. This is an indication that you phone may be compromised.<\/p>\n<h2><a href=\"http:\/\/www.forbes.com\/2009\/07\/28\/hackers-iphone-apple-technology-security-hackers.html\" target=\"_blank\">Click Here To Read About It<\/a><\/h2>\n<p>Hopefully, Apple will be quick to come up with a solution to address this issue.<br \/>\n(<a href=\"http:\/\/www.engadget.com\/2009\/07\/30\/sms-vulnerability-on-iphone-to-be-revealed-today-still-isnt-pa\/\" target=\"_blank\">source<\/a>)<br \/>\n(<a href=\"http:\/\/www.forbes.com\/2009\/07\/28\/hackers-iphone-apple-technology-security-hackers.html\" target=\"_blank\">source2<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It seems that there is a security flaw on iPhone 3.0 software. According to Charlie Miller, one of the two researchers who identified the flaw, they had already notified Apple about it (about 1 month ago). But it seems that nothing is done (yet). So, they are going to publicize [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[4,5,6,14],"tags":[43,1089,1088,31,616],"class_list":["post-4430","post","type-post","status-publish","format-standard","hentry","category-information","category-mobile","category-pda","category-techie","tag-apple","tag-black-hat","tag-hack","tag-iphone","tag-os-30"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p8YKZ-19s","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/4430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/comments?post=4430"}],"version-history":[{"count":2,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/4430\/revisions"}],"predecessor-version":[{"id":4433,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/4430\/revisions\/4433"}],"wp:attachment":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/media?parent=4430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/categories?post=4430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/tags?post=4430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}