SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : The coming US dollar crisis

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: ggersh who wrote (53221)9/27/2013 10:32:03 PM
From: Horgad  Read Replies (1) of 71477
 
I think that it would be unlikely, but it is an interesting idea. Generally, I don't think it would make sense for a hacker to write something like that due do the extra difficulty and steps involved compared to say hacking you from the internet. The hacker would have to find vulnerabilities in first the iphone, then the pc to iphone connection, and then the pc. A search shows me several reported iphone vulnerabilities, but none for the pc to iphone connection vulnerabilities.

That being said it is possible. Anytime you hook one computer to another computer via a network (iphone is a computer, USB cable is your network, and pc is your other computer), there is the possibility of the transfer of malicious files.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext