Feeds

Apple seeks iPhone reverse engineering expert

iPoacher turned gamekeeper role

Top 5 reasons to deploy VMware with Tegile

Apple wants an iPhone security engineer - to beat hackers at their own game. Applicants should develop "proof of concept" attacks and undertake risk analysis on potential security threats affecting Apple's embedded operating system products.

The role, one of 35 security-related posts open at Apple, was first advertised in September 2007 but is still available. Jobseekers should have a degree in computer studies, Mac OS X exposure and experience in reverse engineering* and security. They must work at Apple's Silicon Valley headquarters.

Whoever gets the job has plenty on his plate.

Security flaws in the Safari browser bundled with the iPhone were key to unlocking and jail-breaking the first version, and challenged Apple's exclusive tie-ups with selected carriers. More recently, the prominent IT security researcher Aviv Raff warned that unresolved vulnerabilities in iPhone mail and browser software leave users more vulnerable to phishing attacks. ®

* The iPhone security job is one of only two at Apple that call for reverse engineering expertise, a core hacking skill. The other involves working in developing Apple's digital rights management copy-protection technology.

Security for virtualized datacentres

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
EE buys 58 Phones 4u stores for £2.5m after picking over carcass
Operator says it will safeguard 359 jobs, plans lick of paint
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Google+ GOING, GOING ... ? Newbie Gmailers no longer forced into mandatory ID slurp
Mountain View distances itself from lame 'network thingy'
Vodafone to buy 140 Phones 4u stores from stricken retailer
887 jobs 'preserved' in the process, says administrator PwC
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
Comcast exec: No, we haven't banned Tor. I use it. You're probably using it
Keep in mind if, say, your Onion browser craps out on Xfinity
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.