Wednesday, July 25, 2007

Current News Item

I was on the New York Times Website and I came across an interesting article about the IPhone. The article is called “IPhone Flaw Lets Hackers Take Over, Security Firm Says” and was written by John Schwartz. The article was published July 23, 2007. The link to the site is:

http://www.nytimes.com/2007/07/23/technology/23iphone.html?_r=1&adxnnl=1&adxnnlx=1185163364-1OTsRJvbylLamj17FY2wnw&oref=slogin

The IPhone is a cellular phone that is created by Apple and has many features that make the IPhone unique. The IPhone has a fully interactive touch screen, mp3 player, integrated web browser, WiFi ready, and much more. For further details about the IPhone go here:

http://www.apple.com/iphone/

Its popularity, however, could also be the cause for many security specialists to take an extra long look at the security on the IPhone. One analyst, Charles Miller, according to the article, has found a whole in the security. Charles can demonstrated the vulnerability by visiting his website with the IPhone. Once connected the website was able to pull virtually anything it wanted from the phone as well as perform various tasks. A more detailed explanation of the vulnerability can be found here:

www.exploitingiphone.com

The article also informed the reader that the vulnerability has already be reported to Apple. The Apple corresponded seemed very gracious and said, “We’re looking into the report submitted by I.S.E. and always welcome feedback on how to improve our security.” Apple’s handled the situation very well. I enjoy the part “… and always welcome feedback on how to improve our security.” It seems that Apple is willing to accept that their product is not perfect and trying to do its very best to deliver the best product it can to their customers.

What I liked about this article is how at the end it compared what is happening with Apple products to what has already happened with Microsoft products. Because Microsoft has 95% of the OS market, they are targeted much more than Apple. Another idea in the article talked about how cell phones are basically computers. The type of security for phones is similar to the type of security needed for desktop-based OS’s. I enjoyed this article because I was informed of the IPhone vulnerability and it also put in perspective the reality of situation when comparing Apple with Microsoft

No comments: