76.2 F
Indianapolis
Thursday, April 18, 2024

Security holes discovered in iPhones, iPads

More by this author

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 14px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

SAN FRANCISCO (AP) — A new security hole has opened up in Apple

Inc.’s iPhone, iPad and iPod Touch devices, raising alarms about

the susceptibility of some of the world’s hottest tech gadgets to

hacker attacks.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 14px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Flaws in the software running those devices came to light after a

German security agency warned that criminals could use them to

steal confidential data off the devices. Apple, the world’s largest

technology company by market value, said Thursday that it is

working on a fix that will be distributed in an upcoming software

upgrade.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 14px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

With the security hole, an attacker can get malicious software onto

a device by tricking its owner into clicking an infected PDF file.

Germany’s Federal Office for Information Security called the flaws

“critical weaknesses” in Apple’s iOS operating system.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 14px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Internet-connected mobile devices are still subject to fewer

attacks than personal computer, but they could eventually prove a

juicy target for hackers because they are warehouses of

confidential banking, e-mail, calendar, contact and other

data.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 14px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Software vulnerabilities are discovered all the time. What makes

the latest discovery alarming is that the weaknesses are already

being actively exploited – albeit in a consensual way.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 14px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

The latest concerns were prompted by the emergence of a new version

of a program to allow Apple devices to run any software and

circumvent the restrictions that Apple notoriously retains over

software distributed through its online store. There are security

risks of doing so, but many people find it liberating to install

their own software.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 14px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Although this program is something people would seek out, the

weaknesses that its authors discovered could easily be used for

malice, security experts say.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 14px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

There is an irony in the controversy: The site distributing the

program offers a fix for the problem, but to get the fix, a user

has to first install the program in question. So a user must defy

Apple’s restrictions to get the protection until Apple comes up

with a fix of its own.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 14px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Charlie Miller, a prominent hacker of Apple products, said it

likely took months to develop the program to break Apple’s

restrictions, but a criminal might need only a day or two to modify

it for nefarious purposes.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 14px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

Apple Inc. spokeswoman Bethan Lloyd said Thursday the company is

“aware of this reported issue and developing a fix.” She would not

say when the update will be available.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 14px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

One reason for gadget owners to take heart: Attacks on smartphones

and other Internet gadgets are still relatively rare. One reason is

PC-based attacks are still highly lucrative. Still, vulnerabilities

such as the ones Apple is confronting show that consumers should

take care of securing their mobile devices as they would their home

computer.

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“font-family: Arial, Helvetica, sans-serif; font-size: 14px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px;”>

“These things are computers – they’re just small, portable

computers that happen to have a phone tacked onto them,” said Marc

Fossi, manager of research and development for Symantec Security

Response. “You’ve got to treat them more like a computer than a

phone. You have to be aware of what’s going on with these

devices.”

“font-family: Verdana, Times, serif; font-size: 12px; text-decoration: none; line-height: 13px; color: #000000; font: normal normal normal 12px/normal verdana, helvetica, arial;”>

“text-decoration: none; color: #000066;” rel=”item-license” name=

“8d9c75dc-7265-4e92-ac9f-e0c0b858349a” href=

“http://hosted.ap.org/dynamic/stories/U/US_TEC_IPHONE_INSECURITY?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2011-07-07-18-57-42#8d9c75dc-7265-4e92-ac9f-e0c0b858349a”>

Ā© 2011Ā The

Associated Press. All rights reserved. This material

may not be published, broadcast, rewritten or

redistributed.Ā Learn more about our

“text-decoration: none; color: #000066;” href=

“http://hosted2.ap.org/APDEFAULT/privacy”>Privacy

PolicyĀ andĀ 

href=”http://hosted2.ap.org/APDEFAULT/terms”>Terms of Use.

- Advertisement -
ads:

Upcoming Online Townhalls

- Advertisement -

Subscribe to our newsletter

To be updated with all the latest local news.

Stay connected

1FansLike
1FollowersFollow
1FollowersFollow
1SubscribersSubscribe

Related articles

Popular articles

EspaƱol + Translate Ā»
Skip to content