A patent application shows that Apple is considering adding a security mechanism to the iPhone that would cause it to automatically phone a security agency after being stolen. Upon detecting a force exceeding a predetermined threshold, the device would enter a prevention mode, causing it to send a security transmission in the form of a telephone call or email containing it's GPS coordinates.
The U.S. Trademark and Patent Office published an application from Apple recently on the use of alternate methods for authenticating the user of an iPhone using stealthy techniques like recognition of fingerprints or even facial features. The document, titled "Embedded Authentication Systems in an Electronic Device", also includes an unexpected representation of a jailbroken iPhone that has caused some controversy.
After the Mac went down in 10 seconds using a Safari exploit at this year's Pwn2Own hacking competition, we figured the iPhone didn't stand a chance. Now we're pleasantly surprised to hear that the iPhone 3G survived the entire contest without being hacked. In fact, not a single one of the five smartphones entered were hacked in the alloted time.
Public Wi-Fi hotspots are a great for watching some YouTube or downloading a podcast on your iPhone, but have you ever wondered how secure that Wi-Fi connection is? Someone could be spying on you, and that could be a real problem if you're doing something with more sensitive information like online banking. Hotspot Shield is a great tool for making sure your info doesn't fall into the wrong hands. It utilizes the iPhones VPN capabilities to secure your connection. You can check it out at HotspotShield.com. [via TUAW]
A new iPhone exploit has been uncovered that would allow an attacker to cause the iPhone to make a phone call simply by navigating to a web page. The flaw was to be announced on Monday in ComputerBild on monday but was released in a press release from Fraunhofer Institute for Secure Information Technology.
A developer claims to have found a new exploit in the iPhone that may let App Store developers sneak dangerous code into their apps. With Apple-developed apps, an image called 'Default.png' is displayed while the app is launching, and can do anything from show the current date or display the contents of the app before it's finished loading. App Store devs are limited to static 'Default.png' images, but dev Patrick Collison has found a way around this.
Intel publicly admitted in a statement refuting a comment by one of their mid-level executives that Apple should have used their Moorestown chipset instead of the ARM, saying it wouldn't work due to different power concerns. Now one security researcher says that's not the only reason. There's another, and it's a big one.
Zibri is back once again, and he brings news of a new bug. He first wrote about it back in September, but didn't offer any details. Since then he's apparently tried to apply for a job at Apple, but they have yet to get back to him. So, rather than continue to wait around, he's preparing to reveal the exploit to the public.
Yet another security flaw in the iPhone's software had been found, and while it's probably not particularly harmful to the majority of users, it is pretty interesting. Karl Kraft posted the exploit on his blog, but he wasn't the one to uncover it. No, despite his skills with a computer and knowledge of the software, he didn't find it. Instead he says it was found by his 12-year-old son.
Earlier today, security researcher Aviv Raff publicly revealed two crucial security flaws he had found in the iPhone's software that affect the iPhone's Mail app, both of which pose potential security problems. The first is the obvious fact that the Mail app automatically downloads any images within an email. Doing so refers back to the server it came from when it's downloaded, notifying the sender that it has been opened, proving that the email address is a person that they can send spam to.