iOS 7 asks for trusted computers




To date, finds the Black Hat conference in Las Vegas. Now there was also a weak point of iOS 6 presents, which we already reported . A custom power supply so be able to outwit the security mechanism of iOS. Specialists from the George Institute of Technology had discovered a way to play on his iPhone without the user’s knowledge this malware.

Apple iPhone 5

Used here comes a getarnetes power supply, which is not just for charging, because on the other end hangs a mini PC that would fit in a cigarette pack. The short form: the hackers cheering the iPhone in a developer profile, on which they then install their apps. Frightening? OK, in the wild, the whole is certainly not often occur.

Furthermore, I could understand saying that this gap is already closed in iOS 7th The iPhone also asks when connecting to other computers, if this can be trusted. This is not the case, the iPhone “tight”.

Before and again on the part of Android is laughed Group: I was a few weeks ago in New York and was asked by a lady to charge their Android phone to my notebook. Probably was not locked, so my automatic photo import started immediately and wanted to save the full photos on my device. I then of course canceled.


Tags: , , , , , , , , , , , , , , , , , , ,

In: Technology & Gadgets Asked By: [15575 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »