USA TRENDS

forex, full movies, news, USA news, sports news

What Kind Of Jail Are Atock Iphones In

What Kind of Jail are Stock Iphones in, There are times when I see fellow iPhone owners who have decided leak from their devices and feel a little envious. There are things you can do with their phones that I own a “reserve” the iPhone can not.

They immobilization, custom background screens, file managers, background applications, screen lock players. Many of the limitations that Apple places on the devices are gone, if you’re willing to jailbreak your iPhone, which allows unauthorized code to be installed and run.

But there is a price to pay for everything, and Jailbroken iPhone owners are discovering the cost of freedom. Malware and exploits for these phones are starting to move.

A worm targeting jail broken iPhones was discovered last week, apparently creating a 21-year-old from Australia. Worked on Jailbroken phones where the user had not changed the default root password for SSH access, an application that lets you securely connect to another computer.

He wore a smart load, placing a photo of the 1980’s singer Rick Astley and Home screen background with the words “ikee will never give up.” Yes, the worm first iPhone Rickrolls their victims.

But now, another piece of malware has found it much more dangerous. Intego, which makes security software, said on his blog that Mac security is a program that allows a hacker to retrieve personal information from a jail-broken iPhone:

When connected to a jail-broken iPhone, this tool allows the hacker to silently copy a treasure trove of user data from an iPhone in danger: e-mail, contacts, SMS messages, calendar, photos, music files, videos and as the data recorded by any application for the iPhone. Unlike ikee worm, which signals its presence by the change of wallpaper of the iPhone, this hacker tool gives no indication that has invaded an iPhone.

Hackers are using this tool is installed on a computer – Mac, PC, Unix or Linux – leave the job. Analyzes network access, and when it finds a jailbroken iPhone, you break it, then steals data and records it.




This hacker tool could be easily installed, for example, on a computer display in a retail store, which could then analyze all the iPhones that pass within his network. Or a hacker could sit in an internet cafe and let your exploration team all iPhones that come within range of WiFi network in search of data. Hackers could even install this tool on their own iPhones, and use it to search for Jailbroken phones as they go about their daily business.

0 comments:

Post a Comment