Think That iPhone Isn't A Corporate Security Risk?
If so, you had better think again. Researchers have shown how the passwords on the iPhone can be revealed in less than six minutes.
If so, you had better think again. Researchers have shown how the passwords on the iPhone can be revealed in less than six minutes.Security managers and CIOs alike have enough to worry about when it comes to securing mobile devices. They certainly didn't need to learn that many of the passwords stored on an iPhone can be had in about half the time it takes to hard boil an egg.
But that's exactly what researchers in Germany just disclosed, and it's raising eyebrows. The cracking technique requires attackers have physical access to the device. Considering how many mobile devices are lost every year, that's not much consolation in this case.
These researchers conducted their attack against an iPhone 4 (not jailbroken) equipped with the most recent firmware. iPads are susceptible, too. Researchers said. The passwords recovered are those used for wifi networks, some applications (depending on how they were programmed) as well as the password credentials to e-mail and VPNs.
Here's a video demonstration:
The tools and techniques needed to conduct the necessary jailbreak and file access are widely available. What this team did was figure out how to extract the actual passwords.
The researchers' full paper, Lost iPhone? Lost Passwords! Practical Consideration of iOS Device Encryption Security is available here in .pdf format.
For my security and technology observations throughout the day, find me on Twitter.
Published: 2014-11-25 mountall 1.54, as used in Ubuntu 14.10, does not properly handle the umask when using the mount utility, which allows local users to bypass intended access restrictions via unspecified vectors.
Published: 2014-11-25 ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6407. Reason: This candidate is a reservation duplicate of CVE-2014-6407. Notes: All CVE users should reference CVE-2014-6407 instead of this candidate. All references and descriptions in this candidate have been removed to pre...
Published: 2014-11-25 DocumentProvider in RESTEasy 2.3.7 and 3.0.9 does not configure the (1) external-general-entities or (2) external-parameter-entities features, which allows remote attackers to conduct XML external entity (XXE) attacks via unspecified vectors.