Feeds

iPhone 4: Now with added jailbreaky fun

Windows Phone too

Secure remote control for conventional and virtual desktops

iPhone 4 and Windows Phone 7 owners can now jailbreak their handsets.

Users of Windows Phone unhappy to find themselves at the end of Microsoft's phased rollout of its latest update can now hack themselves a fix, and upgrade when they want to, rather than when Microsoft tells them to.

Meanwhile, Apple customers who have jumped to iOS 4.3.1 can also bypass their platform provider in jailbreaking their devices to install any software they like, as long as they don't have an iPad 2.

The two hacks come from respected developer camps, PwnageTool and RedSn0w from the iPhone Dev Team, who have so effectively broken the security on previous iOS devices, while the Chevron updater comes from the chaps who previously created a jailbreaking tool for Windows Phone 7 devices.

That tool was withdrawn at Microsoft's request, which came accompanied by a promise to work with the Chevron chaps to create a legitimate homebrew option for Windows Phone users (a promise that has yet to yield fruit). Those with a Windows Phone 7 handset still can't install software that lacks Microsoft's seal of approval, but at least they can install the latest OS version without waiting for Redmond.

The iOS jailbreak is the first to allow rebooting without having to unlock the device again; but it won't work on the iPad 2 which, according to CNET, seems to be better secured than previous hardware, showing that Apple hasn't given up the fight for simplification through control.

That fight will certainly continue, though it is not just a technical battle as Apple and Microsoft work to make jailbreaking (and unlocking) less desirable as well as more difficult. Security is never impenetrable, but it can be designed to be more effort than it's worth. ®

Internet Security Threat Report 2014

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.