Feeds

iPhone becomes phisherman's friend

Embedded scam risk unearthed

Intelligent flash storage arrays

Security shortcomings in the design of Apple's iPhone might make it easier to mount phishing and cross-site scripting attacks.

The iPhone's email client only displays the first few characters of a weblink, a factor researchers at Fortify Software warn makes it easier to hide a fraudulent URL at the end of a link without arousing suspicion.

The mechanism the iPhone uses to link between web browser and telephone functions also makes it easier to embed scam telephone numbers within sites, which a user may be prompted to dial.

Fortify says the security shortcomings of the iPhone mean users are exposed to risk from relatively simple phishing techniques, either by accidentally clicking through to fraudulent websites or unwittingly making expensive premium line calls.

"Without immediate attention, this problem could lead to a deluge of hackers attempting to mimic native iPhone applications and gain access to other personal information such as contacts, photos, and maybe even the phone's physical location," Fortify chief scientist Brian Chess said.

Since the much-hyped release of the iPhone earlier this month, security researchers and white hat hackers have been hard at work attempting to spot security vulnerabilities in Apple's device. Early probing unearthed ways to subvert the device's browser and uncover passwords hiding in Apple software.

Others hackers have been trying to unlock the functionality of the iPhone. Reverse engineer Jon Lech Johansen (DVD Jon) discovered a way to get iPod and Wi-Fi - though not the phone - features of the device working without signing up to AT&T within three days of its release.

The iPhone Development Project claims to have replicated this and has set out a programme of goals, including the ability to unlock the phone and run third party applications on the device. ®

Security for virtualized datacentres

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.