Think That iPhone Isn't A Corporate Security Risk?
If so, you had better think again. Researchers have shown how the passwords on the iPhone can be revealed in less than six minutes.
If so, you had better think again. Researchers have shown how the passwords on the iPhone can be revealed in less than six minutes.Security managers and CIOs alike have enough to worry about when it comes to securing mobile devices. They certainly didn't need to learn that many of the passwords stored on an iPhone can be had in about half the time it takes to hard boil an egg.
But that's exactly what researchers in Germany just disclosed, and it's raising eyebrows. The cracking technique requires attackers have physical access to the device. Considering how many mobile devices are lost every year, that's not much consolation in this case.
These researchers conducted their attack against an iPhone 4 (not jailbroken) equipped with the most recent firmware. iPads are susceptible, too. Researchers said. The passwords recovered are those used for wifi networks, some applications (depending on how they were programmed) as well as the password credentials to e-mail and VPNs.
Here's a video demonstration:
The tools and techniques needed to conduct the necessary jailbreak and file access are widely available. What this team did was figure out how to extract the actual passwords.
The researchers' full paper, Lost iPhone? Lost Passwords! Practical Consideration of iOS Device Encryption Security is available here in .pdf format.
For my security and technology observations throughout the day, find me on Twitter.
Published: 2014-11-22 Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.
Published: 2014-11-22 IBM Security Network Protection 5.1 before 126.96.36.199 FP13, 5.1.1 before 188.8.131.52 FP8, 5.1.2 before 184.108.40.206 FP9, 220.127.116.11 before FP5, 5.2 before 18.104.22.168 FP5, and 5.3 before 22.214.171.124 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.
Published: 2014-11-22 Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...
Published: 2014-11-22 The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
Published: 2014-11-22 Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.