SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Apple Tankwatch
AAPL 255.53-1.0%Jan 16 9:30 AM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: iggyl who wrote (12297)11/8/2011 5:49:40 AM
From: sylvester80  Read Replies (2) of 32692
 
BREAKING...After latest iPhone hack, researcher Charlie Miller kicked out of iOS dev program [ed: they kick out the guy who helps CrApple find bugs in their iPOS... if that isn't fascism I don't know what is...sheesh...]
By Ryan Naraine | November 8, 2011, 2:30am PST
zdnet.com
Summary: Charlie Miller defeats a major iOS security mechanism, a move that ruffles feathers in Cupertino.



Charlie Miller gets a kick of out defeating Apple’s security mechanisms, using his hacking skills to break into Macbooks and iPhones. Now, Apple has kicked the security researcher out of its iOS developer program after word got out that he built a proof-of-concept iPhone app to showcase a bypass of the code signing mechanism.

According to Forbes’s Andy Greenberg, Miller found a way to sneak an evil app into the iPhone/iPad app store and will demonstrate the vulnerability at the upcoming SysCan conference in Taiwan.

Miller plans to present a method that exploits a flaw in Apple’s restrictions on code signing on iOS devices, the security measure that allows only Apple-approved commands to run in an iPhone or iPad’s memory. Using his method–and Miller has already planted a sleeper app in Apple’s App Store to demonstrate the trick–an app can phone home to a remote computer that downloads new unapproved commands onto the device and executes them at will, including stealing the user’s photos, reading contacts, making the phone vibrate or play sounds, or otherwise repurposing normal iOS app functions for malicious ends.

Miller has created a video demonstrating the attack, which gave him enough control over the hijacked iPhone to control the device vibration or read files off the iPhone.

Greenberg writes that Miller effectively created a proof-of-concept app called Instastock that appears to merely list stock tickers, but also communicates with a server controlled by Miller, “pulling down and executing whatever new commands he wants.”

Details on the actual vulnerability being exploited is being kept under wraps until Apple issues a fix.

Just hours after word of his Miller’s app — which was approved by Apple — was publicized by Greenberg, Apple nuked Miller from the iOS dev program “effective immediately.”
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext