Posts Tagged ‘iOS’


GalileoHacking Team Remote Control System: Spy Software “Galileo” can hack any mobile devices

Hackers from Italy said that they could hack any smartphone.

There is a tool in the software market, that can spy the owners of devices running iOS, Android, Windows Phone, BlackBerry, as well as Mac and PC. Italian hackers from Hacking Team reported about the release of Galileo.

Hackers from Italy, known as Hacking Team, announced the release of the program, which is capable to hack any smartphone running iOS, Android, Windows Phone and BlackBerry. In addition, the developers claim that the tool is able to hack computers running Windows and OS X. (more…)

Network security iOS

Posted: December 1, 2012 in Articles
Tags: , ,

iOSIn addition to the basic functions of protection and security features and data encryption, iOS devices provide a wide range of network security features to securely transmit data over the network to both individual and corporate users. For corporate users, it is important that they can access corporate data from anywhere in the world. No less important and reliable user authentication and secure transmission of data. iOS uses, and gives developers access to the standard network protocols to create authorized, authenticated and encrypted connections.

iMessage – an application for instant messaging. In earlier versions it was only possible to exchange text messages. Starting with iOS 3.0, adds support for MMS messages.

Other mobile platforms to protect open ports may require additional installation of a firewall. By reducing the attack surface (no optional network utilities like telnet), iOS additional firewall does not. In addition, messages transmitted through the services of iMessage, FaceTime and Apple Push Notification Service is fully encrypted and authenticated. (more…)

Vulnerability

vulnerabilities in iOS

Vulnerability: Multiple vulnerabilities in iOS

Danger: High
Patch: Yes
Number of vulnerabilities: 4
CVE ID: CVE-2012-3748
CVE-2012-3749
CVE-2012-3750
CVE-2012-5112

Impact:
– Disclosure of system information;
– Bypass Security;
– Compromise of the system. (more…)