contador Skip to content

IPhone security: potentially at risk

Although Steve Jobs has closed the iPhone operating system to ensure its stability and prevent the installation of malware, according to Marius van Oers, a researcher at McAfee's AVERT Labs, the "web" opening of the mobile phone could represent one of the weakest points of the device .

Apple pushes on the development of web applications, but perhaps overlooks the fact that many hackers could exploit Safari to start a malicious code: it would be enough to send an email or an SMS containing a link. Once the link is clicked, a page capable of starting malicious code would open, and at that point a hacker could have full control of the terminal, especially if this state was previously "opened" with hacks installed by the owner.

In this regard, we recall the security issues that have already emerged; Apple has already done so, but it shows us the vulnerability that can be conveyed by web access. Not to mention (continues van Oers) the compatibility of Safari with JavaScript, a language often used to carry out various exploits, and the vulnerabilities of QuickTime, although for the latter it does not evidence exists on the weakness of the program on the iPhone.

Although hacking on mobile devices is not widespread, attacks with the mobile phone could become more frequent with the European launch of the iPhone. The flaws could be exploited to launch numerical self-dialing programs, by making phone calls through which an attacker could make an economic return.

The "closure" of Apple to the installation of external applications also seems an effective way to avoid possible intrusions.

According to van Oers, fortunately today the situation is not absolutely critical, but not said that the same scenario awaits us for the future.