iPhone hacker reveals SMS vulnerability

Share this article:
A security researcher on Thursday unveiled a new iPhone SMS vulnerability, according to reports out of the SyScan Conference in Singapore.

Presenting at the show, Charlie Miller, a well-known Mac hacker who works for Baltimore-based Independent Security Evaluators, released only minor details about the flaw, which reportedly can be used by an attacker to take control of the device to perform actions such as eavesdropping on conversations or tracking down a user's location through the phone's GPS capability.

According to the conference agenda, Miller's hourlong talk examined the security architecture of the iPhone and demonstrated how to perform automated SMS fuzzing (inputting invalid or random data as a test) on the device.

"[The presentation] will then demonstrate some payloads for the iPhone," the description said. "iPhone payloads are complicated by the fact that on factory phones, no pages can be made executable."

Miller is expected to provide more specifics on the bug later this month at the Black Hat conference in Las Vegas. The researcher reportedly is working with Apple on a fix.

An Apple spokesman did not immediately respond to a request for comment.
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

President signs Executive Order to improve payment security

President signs Executive Order to improve payment security

President Obama signed an Executive Order at the Consumer Financial Protection Bureau calling for enhanced security measures, including microchips and PINs.

Security, tech firm coalition fights Hikit actors, other advanced groups

Security, tech firm coalition fights Hikit actors, other ...

The coalition began as an effort to stop the spread of the Hikit trojan, previously known for targeting U.S. defense contractors.

Phishing email delivers keylogger malware, also takes screenshots

Phishing email delivers keylogger malware, also takes screenshots

The malware has various features, including the ability to start persistently, take screenshots and bypass user access controls.