• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

More hackers may take aim at Apple: analyst

makapaaa

Alfrescian (Inf)
Asset
<TABLE cellSpacing=0 cellPadding=0 width=452 border=0><TBODY><TR><TD vAlign=top width=452 colSpan=2>Published August 11, 2008
c.gif

</TD></TR><TR><TD vAlign=top width=452 colSpan=2>More hackers may take aim at Apple: analyst

<TABLE class=storyLinks cellSpacing=4 cellPadding=1 width=136 align=right border=0><TBODY><TR class=font10><TD align=right width=20> </TD><TD>Email this article</TD></TR><TR class=font10><TD align=right width=20> </TD><TD>Print article </TD></TR><TR class=font10><TD align=right width=20> </TD><TD>Feedback</TD></TR></TBODY></TABLE>
(LAS VEGAS) Security specialists said last Saturday that hackers are taking increasing aim at iPhones and Macintosh computers as the hot-selling Apple devices gain popularity worldwide.

Hackers have historically focused devious efforts on computers using Windows operating systems because the Microsoft software has more than 90 per cent of the global market, promising evil-doers a wealth of targets.
Macintosh computers have been gaining market share and catching the interest of hackers, according to Zero Day Initiative (ZDI) security vulnerability analyst Cameron Hotchkies.
'There are more eyes looking over Apple products for vulnerabilities,' Mr Hotchkies told AFP at a notorious annual DefCon gathering of hackers in Las Vegas.
'It has slowly been growing as a target people are more and more interested in.' Mr Hotchkies specialises in Apple software as part of a ZDI team devoted to scrutinising programming holes and crafting 'patches' to prevent hackers from exploiting weaknesses.
More than a thousand people crammed into his DefCon talk about hacking Apple software. He was peppered with technical questions at the close of the session.
<SCRIPT language=javascript> <!-- // Check for Mac. var strAgent; var blnMac; strAgent = navigator.userAgent; strAgent.indexOf('Mac') > 0 ? blnMac = true:blnMac = false; if (blnMac == true) { document.write('
'); } //--> </SCRIPT><TABLE cellSpacing=0 cellPadding=4 width=300 align=right border=0><TBODY><TR><TD vAlign=top align=middle>
greenline.gif

adgrey.gif

<!-- AdSpace --><IFRAME marginWidth=0 marginHeight=0 src="http://ads.asia1.com.sg/html.ng/site=tbto&sec=btobizit&cat1=it&cat2=btobizitart&size=300X250" frameBorder=0 width=300 scrolling=no height=250 bordercolor="#000000"><script language='JavaScript1.1' src='http://ads.asia1.com.sg/js.ng/Params.richmedia=yes&site=tbto&sec=btobizit&cat1=it&cat2=btobizitart&size=300X250'></script><noscript> </noscript></IFRAME><!-- /AdSpace-->
greenline.gif
</TD></TR></TBODY></TABLE>'There are a lot more people getting into it and really getting their hands dirty,' said Mr Hotchkies, who noted an obvious spike this year in the number of DefCon attendees toting Macintosh laptops.
'I've been seeing a lot of reverse engineering on the Apple platform.' Part of the reason for increased popularity of Macintosh computers is that Apple has made the machines friendlier to running programs popular on Windows-based machines.
Hackers experienced with attacking Windows programs can apply some of their know-how to software modified to run on Macintosh computers.
Developers that re-craft Windows programs for Macintosh systems might not be adept at building security components on the latest Leopard operating system used in Apple machines.
'Windows developers take their code and make it work on Apple,' Mr Hotchkies said. 'They could take potential vulnerabilities with them or possibly create new ones because they are working on an entirely different platform.' Apple's Safari operating system is the basis for Internet browsing using iPhones, which are basically handheld mini-computers with telephone, music, and video viewing capabilities.
It took about a month for someone to hack a first-generation iPhone after its release, but an iPhone 3G was cracked within hours of the start of sales in July.
The hack is crowned a 'jail break' because it liberates iPhone models from the shackles of deals Apple has with telecom giants providing exclusive service to the devices in varying countries. 'It shows people are getting proficient at analysing Apple software,' Mr Hotchkies said.
'There are people looking at the iPhone. We pass vulnerabilities on to vendors, and when I communicate with Apple the first thing they ask is if we've tested it on the iPhone.' Apple engineers are also addressing 'legacy issues', protecting old software from new threats, according to Mr Hotchkies. -- AFP

</TD></TR></TBODY></TABLE>
 
Top