Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,152,773 members, 7,817,164 topics. Date: Saturday, 04 May 2024 at 07:31 AM

Apple Devices Vulnerable To Attack Via Bogus Charger - Phones - Nairaland

Nairaland Forum / Science/Technology / Phones / Apple Devices Vulnerable To Attack Via Bogus Charger (491 Views)

How To Create Apple ID Without Adding Debit/credit Card On Apple Devices / Secure Your Samsung Device:600 Million Devices Vulnerable To Hackers!!! / Samsung Smartphones Are Vulnerable To Remote Wipe Attack (2) (3) (4)

(1) (Reply)

Apple Devices Vulnerable To Attack Via Bogus Charger by daylae(m): 2:44pm On Jun 04, 2013
Apple devices vulnerable to attack via bogus charger
4 June 2013 Last updated at 11:14

Any Apple device running the iOS operating system could be infected by the bogus charger
Apple iPhones can be taken over with "alarming" ease using a custom-built charger, security researchers warn.
Using the bogus charger, a team from Georgia Institute of Technology managed to infect a phone with a virus in less than aminute.
Any device using Apple's iOS operating system would be as vulnerable to infection, claim the trio.
More details of their work will be given at the upcoming Black Hat USA hacker conference.
Computer control
Brief details of the work were given in a summary of the talk the three researchers are scheduled to present at the hackers' get-together.
The researchers, Billy Lau, Yeongjin Jang and Chengyu Song, said they were able to get around the many defences in iOSto install any software they wanted on a target device.
"All users are affected, as our approach requires neither a jail broken device nor user interaction," they wrote.
The team created their malicious charger using a tiny bare-bones computer called a BeagleBoard that costs about £30 ($45).
"This hardware was selected to demonstrate the ease with which innocent-looking, malicious USB chargers can be constructed," wrote the researchers in their conference summary.
This computer on the Beagle Board communicates with the target computer and carries out the attack that loads malicious software. The researchers say they studied Apple's security systems closely to find a way round its attempts to stop attackers installing rogue programmes and apps.
The researchers hid the malicious application they installed by using the same method Apple employs to conceal the location of its own applications on iOS devices.
The presentation will also make recommendations about how Apple could close the vulnerability uncovered by the team.

http://mobile.bbc.co.uk/news/technology-22764815
Re: Apple Devices Vulnerable To Attack Via Bogus Charger by flexxzzy(m): 11:24pm On Jun 04, 2013
Wow... I love technology

(1) (Reply)

How Do I Configure T501 / Samsung Galaxy Tab7.0inches For Sale@28k / New Blackberry OS 10.2 Will Support Android Jelly Bean Apps

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 10
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.