Your membership has expired

The payment for your account couldn't be processed or you've canceled your account with us.

Re-activate

Save products you love, products you own and much more!

Save products icon

Other Membership Benefits:

Savings icon Exclusive Deals for Members Best time to buy icon Best Time to Buy Products Recall tracker icon Recall & Safety Alerts TV screen optimizer icon TV Screen Optimizer and more

    iPhone Hacking Raises Security Concerns for all Smartphone Users

    Consumer Reports News: July 24, 2007 11:16 AM

    Security analysts have long predicted that hackers who routinely pester computer users would eventually target smart phones, whose advanced network connections and operating systems continue to become more computer-like. Indeed, smart-phone virus outbreaks have been reported in Europe and Asia.

    This week Independent Security Evaluators (ISE), a U.S. independent testing lab, dramatized the looming danger by piercing the defenses of the much-vaunted iPhone. (ISE is the lab whose help Consumer Reports seeks for our evaluations of security software. See our report on how we test antivirus software and look for our 2007 State of the Net report, which posts to ConsumerReports.org in early August.)

    See our complete coverage on:

    Some telecom experts believed the iPhone was relatively immune from such attacks because of the limited access Apple granted third-party developers to iPhone's operating system (a stripped-down version of the one that runs on Macs), and because iPhone's Safari Web browser lacks the ability to use plug-ins, such as Flash, a primary entry point for Web-borne attacks.

    Yet ISE was able to hack into a New York Times reporter's iPhone when it (voluntarily) visited a special Web site they created, which uploaded malicious software and gave the "hackers" unlimited access to files and phone functions. (Note: The embedded link will take you to the New York Times Web site, which may display an online ad before presenting its story on hacking the iPhone.)

    Besides downloading contact information and recent text messages, ISE claims it was able to seize control of the phone, and program it to dial any number, send any text message—-even turn the iPhone into a bugging device to eavesdrop on anyone within earshot. More important, while ISE's focus was the iPhone, their main point is cell-phone providers need spruce up their security act. More details of ISE's iPhone effort are available on https://www.exploitingiphone.com/.

    ISE has sent its recommendations for security patches to Apple. In the meantime, it offers these tips for iPhone and other smart-phone owners to minimize risk:

    • Only visit Web sites you know
    • Only use Wi-Fi networks you trust
    • Don't open Web links from e-mails

    --Mike Gikas

    Paul Eng


    E-mail Newsletters

    FREE e-mail Newsletters! Choose from cars, safety, health, and more!
    Already signed-up?
    Manage your newsletters here too.

    Electronics News

    Cars

    Cars Build & Buy Car Buying Service
    Save thousands off MSRP with upfront dealer pricing information and a transparent car buying experience.

    See your savings

    Mobile

    Mobile Get Ratings on the go and compare
    while you shop

    Learn more