05:21 PM
George V. Hulme
George V. Hulme

iPhone Is Owned Again; Yawn

A little more than a week after Apple's shiny new iPhone 3G went on sale, a team of programmers say they've, once again, gained control over the highly coveted gadget.

A little more than a week after Apple's shiny new iPhone 3G went on sale, a team of programmers say they've, once again, gained control over the highly coveted gadget.A group known as the "iphone-dev team" announced yesterday that the iPhone 3G has been "jailbroken," as in "hacked," or, if you're really into the slang, "pwned."

In a post headlined "Thanks for waiting," the iphone-dev team made available Pwnage 2.0 for both the iPhone and iPod touch. This makes it possible to run applications not sanctioned by the application gatekeepers at 1 Infinite Loop, Cupertino.

Now, few would doubt that the iphone-dev team helped fuel the success of iPhone 1.0. Without their tool there was no way to run third-party software, which to a software junkie like me made the iPhone much less useful than my old Dell Axim pocket PC. I wanted any phone I carried to be able to run applications and manage my data. Plus, last year there were many areas of the globe where there were no carriers available for the phone.

Just to be clear, Pwnage 2.0 currently only jailbreaks the iPhone to make it possible circumvent Apple's software gates, it doesn't yet unlock the phone for use on unsanctioned cellular networks.

Today, it seems Apple is well on its way to having a very active, almost fanatical, development community with hundreds of applications already available. (I still haven't found a list management application as powerful as ListPro, but that's another topic.) And more applications are rolling down the pipeline.

Now, one could make a good argument against the walled-garden approach to application availability Apple is putting forth, but after years of suffering through many crappy Windows Mobile applications, a little quality control might not be a bad idea. Time will tell.

Additionally, the costs of unlocked iPhone 3Gs look to be just shy of $900. That almost makes the AT&T contract look cheap.

So this time around, I don't see much value in hacking open the iPhone, especially not with the risk of waking up one day to find it bricked.

So, have any InformationWeek.com readers given Pwnage 2.0 a whirl? If so, we'd like to hear about it.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
IoT Product Safety: If It Appears Too Good to Be True, It Probably Is
Pat Osborne, Principal - Executive Consultant at Outhaul Consulting, LLC, & Cybersecurity Advisor for the Security Innovation Center,  3/12/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.