SMS vulnerability on iPhone to be revealed today, still isn’t patched

Remember that alleged SMS-based security hole on the iPhone allowing evil-doers to execute arbitrary code and do all sorts of nasty crap like create an army of mobile zombies ready and willing to execute a DoS attack? The guy who found it, security expert Charlie Miller, said that he’d reveal the details of it at Black Hat — and Black Hat’s this week. Sure enough, Miller and his cohorts plan to unleash details of the hack today, and while they claim they informed Apple of the problem over a month ago, Cupertino’s yet to make a move. We’d stop short of suggesting iPhone owners all turn off their handsets and take themselves firmly off the grid and into a completely disconnected underground bunker the moment the attack becomes public, but if it’s as serious as Miller claims, it definitely bumps up the pressure on Apple to get a fix out on the double — preferably before 3.1 drops.

Filed under: ,

SMS vulnerability on iPhone to be revealed today, still isn’t patched originally appeared on Engadget on Thu, 30 Jul 2009 03:29:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Text-Message Exploit Can Hijack Every iPhone, Researchers Say

_mg_10481
Security researchers plan to reveal a security hole that would enable hackers to take complete control of an iPhone with a text-messaging attack.


Security researchers Charlie Miller and Collin Mulliner will publicize the exploit Thursday at the Black Hat cybersecurity conference, according to Forbes. The researchers said the hack involves sending a series of mostly invisible SMS bursts that effectively hijack an iPhone. From thereon, a hacker could control all the functions on the iPhone, such as e-mailing, dialing contacts — and, most alarmingly, sending more text messages to hijack even more iPhones.

How can you know if you’re being SMS attacked? According to Miller, one giveaway is if you receive a text message containing a single square character. If that happens, he suggests you immediately turn off your iPhone.

“This is serious,” Miller told Forbes. “The only thing you can do to prevent it is turn off your phone. Someone could pretty quickly take over every iPhone in the world with this.”

Though many customers hail the iPhone as one of the most well designed and versatile smartphones, security researchers have criticized the phone for its weak security. For example, Wired.com recently reported on forensics researcher Jonathan Zdziarski’s discovery that the new iPhone 3GS’ data encryption can be cracked in a few minutes with free software. Because of this flaw, Zdziarski recommended against the iPhone being used by businesses.

Miller and Mulliner said they contacted Apple about the SMS exploit a month ago, but the company has not released a software update to fix the issue. Apple did not immediately respond to Wired.com’s request for comment.

Though the researchers informed Forbes of the SMS exploit, it’s worth noting they did not demonstrate it to Forbes. We’ll be convinced this is true once we see it.

For ongoing coverage of the Black Hat conference, read Wired.com’s Threat Level.

See Also:


Photo: Jon Snyder/Wired.com


Apple: Jailbreaking iPhones Breaks Cell Towers, Destroys the World

Apple_iPhone_3G.jpgGrand hyperbole or real threat? Either way, Apple’ latest anti-jailbreaking claims are downright poetic. The company last week filed claims with the Copyright Office, suggesting that jailbreaking one’s iPhone could be “potentially catastrophic” to cellphone networks.

The claim, which was brought to light by the Electronic Frontier Foundation, suggested that “Jailbreaking could allow hackers to altering the iPhone’s BBP–the “baseband processor” software, which enables a connection to cell phone towers,” according to Wired.

Using the jailbroken handset, Apple claims, a hacker could launch denial of service attacks, crashing cell tower software. The company added: “Taking control of the BBP software would be much the equivalent of getting inside the firewall of a corporate computer–to potentially catastrophic result.”

BedBunker: Sleep Sound On Top of Your Weapon Stash

bgs_r4_c11

Apparently one of the most common, and therefore obvious, places to hide your valuables is under the bed. This means its the first place a thief will look. But if you have the BedBunker, it will make no difference — he won’t be able to open it anyway.

The BedBunker is a gun cache which sits under your mattress and infuses your dreams with manly, death-spraying action. Inside the 10-gauge steel box you can cram the bare essentials for survival: 35 rifles and 70 handguns. You can even take the optional castors to turn this into a rolling weapon-wagon.

Worried that things might get hot and the caps will start popping underneath you? The safe is fireproofed for 120 minutes, giving you time to get out before things blow. For the truly paranoid, we suggest just throwing a mattress inside and sleeping in the BedBunker itself (warning, air supplies may be tight). How much for this macho princess-and-the-pea accessory? $2,200-$4,000 depending on size. Infomercial below.

Product page [Bed Gun Safe via Uncrate]


All Weather Cellular Camera is an all weather cellular camera

Looking to bolster your home surveillance setup with something sure to survive power outages, harsh weather conditions and / or zombie invasions? Then you may want to accept no less than this new All Weather Cellular Camera now available from Brickhouse Security, which promises to provide just about everything you’d expect from a surveillance system in an entirely self-contained unit. That includes a PIR body heat-activated nightvision camera (just 1.3-megapixels, but you can’t be too picky in these cases), 50 infrared flash bulbs, a built-in tactical laser to ensure it’s pointing at just the right spot, a CompactFlash card slot to store images in case the cellular network goes down, and a 6V battery that promises to last for four to six weeks (which can be doubled with an optional second battery), to name but a few features. Naturally, none of that comes cheap and, at $599, you may want to consider a second camera to keep an eye on the first.

Filed under: ,

All Weather Cellular Camera is an all weather cellular camera originally appeared on Engadget on Mon, 27 Jul 2009 21:06:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Hacker Says iPhone 3GS Encryption Is ‘Useless’ for Businesses

_mg_10531

Apple claims that hundreds of thousands of iPhones are being used by corporations and government agencies. What it won’t tell you is that the supposedly enterprise-friendly encryption included with the iPhone 3GS is so weak it can be cracked in two minutes with a few pieces of readily available freeware.


“It is kind of like storing all your secret messages right next to the secret decoder ring,” said Jonathan Zdziarski, an iPhone developer and a hacker who teaches forensics courses on recovering data from iPhones. “I don’t think any of us [developers] have ever seen encryption implemented so poorly before, which is why it’s hard to describe why it’s such a big threat to security.”

With its easy-to-use interface and wealth of applications available for download, the iPhone may be the most attractive smartphone yet for business use. Many companies seem to agree: In Apple’s quarterly earnings conference call Tuesday, Apple chief operating officer Tim Cook said almost 20 percent of Fortune 100 companies have purchased 10,000 or more iPhones apiece; multiple corporations and government organizations have purchased 25,000 iPhones each; and the iPhone has been approved in more than 300 higher education institutions.

But contrary to Apple’s claim that the new iPhone 3GS is more enterprise friendly, the new iPhone 3GS’ encryption feature is “broken” when it comes to protecting sensitive information such as credit card numbers and social-security digits, Zdziarski said.

Zdziarski said it’s just as easy to access a user’s private information on an iPhone 3GS as it was on the previous generation iPhone 3G or first generation iPhone, both of which didn’t feature encryption. If a thief got his hands on an iPhone, a little bit of free software is all that’s needed to tap into all of the user’s content. Live data can be extracted in as little as two minutes, and an entire raw disk image can be made in about 45 minutes, Zdziarski said.

Wondering where the encryption comes into play? It doesn’t. Strangely, once one begins extracting data from an iPhone 3GS, the iPhone begins to decrypt the data on its own, he said.

To steal an iPhone’s disk image, hackers can use popular jailbreaking tools such as Red Sn0w and Purple Ra1n to install a custom kernel on the phone. Then, the thief can install an Secure Shell (SSH) client to port the iPhone’s raw disk image across SSH onto a computer.

To demonstrate the technique, Zdziarski established a screenshare with Wired.com, and he was able to tap into an iPhone 3GS’ data with a few easy steps. The encryption did not pose any hindrance.

Nonetheless, professionals using the iPhone for business don’t seem to care, or know, about the device’s encryption weakness.

“We’re seeing growing interest with the release of iPhone 3.0 and the iPhone 3GS due in part to the new hardware encryption and improved security policies,” Cook said during Apple’s earnings call. “The phone is particularly doing well with small businesses and large organizations.”

Clearly, the gigantic offering of iPhone applications is luring these business groups. Quickoffice Mobile, for example, enables users to access and edit Microsoft Word or Excel files on their iPhone. For handling transactions, merchants can use apps such as Accept Credit Cards to process a credit card on an iPhone anywhere with a Wi-Fi or cellular connection.

Several employees of Halton Company, an industrial equipment provider, are using iPhones for work, according to Lance Kidd, chief information officer of the company. He said the large number of applications available for the iPhone make it worthy of risk-taking.

“Your organization has to be culturally ready to accept a certain degree of risk,” Kidd said. “I can say we’ve secured everything as tight as a button, but that won’t be true…. Our culture is such that our general manager is saying, ‘I’m willing to take the risk for the value of the applications.’”

Kidd noted that Halton employees are not using iPhones for holding confidential customer information, but rather for basic tasks such as e-mailing and engaging with clients via social networking sites such as Facebook and Twitter. Halton also plans to code apps strictly for use at the company, Kidd said.

According to Kidd, a security expert performed an evaluation of Halton, and he said it was possible for any hacker to find an infiltration no matter the level of security. Therefore, Halton has measures in place to respond to an information security threat rather than attempt to avoid it.

“It’s like business continuity,” Kidd said. “You prepare for disasters. You prepare for if there’s an earthquake and the building breaks down, and you prepare for if there’s a crack in [information] security.”

But Zdziarski stands firm that the iPhone’s software versatility isn’t worth the risk for use in the workforce. He said sensitive information is bound to appear in e-mails or anything that can be contained on the iPhone’s disk, which can be easily extracted by thieves thanks to the new handset’s shoddy encryption.

Zdziarski said it’s up to the app developers to add an extra level of security to their apps because Apple’s encryption feature is so poor.

“If they’re relying on Apple’s security, then their application is going to be terribly insecure,” he said. “Apple may be technically correct that [the iPhone 3GS] has an encryption piece in it, but it’s entirely useless toward security.”

He added that the ability for the iPhone to self-erase itself remotely using Apple’s MobileMe service isn’t very helpful, either: Any reasonably intelligent criminal would remove the SIM card to prevent the remote-wipe command from coming through. (In a past Wired.com report, Zdziarski said the iPhone’s remote-wiping ability pales in comparison to Research In Motion’s BlackBerry, which can self-delete automatically after the phone has been inactive on the network for a preset amount of time.)

On top of that, the iPhone isn’t well protected in general usability, said John Casasanta, founder of iPhone development company Tap Tap Tap. He said though Apple’s approval process scans for malicious code, a developer could easily tweak the app to send a user’s personal data, such as his contacts list, over the network without his knowing.

“Apple can see if something is blatantly doing something malicious in the approval process, but it wouldn’t be very hard to do something behind the scenes,” Casasanta said.

Evidently, it isn’t difficult to sneak unauthorized content into the App Store. In May, Wired.com reported on an exploit demonstrated by the iPhone app Lyrics. Apple initially rejected the app because it contained profane words, and then Lyrics’ developer snuck the profanity into the app with a hidden Easter egg. Apple then approved the application.

Zdziarski added that there are other weaknesses with the iPhone: Pressing the Home button, and even zooming in on a screen, automatically creates a screenshot temporarily stored in the iPhone’s memory, which can be accessed later. And then there’s the keyboard cache: key strokes logged in a file on the phone, which can contain information such as credit card numbers or confidential messages typed in Safari. Cached keyboard text can be recovered from a device dating back a year or more, Zdziarski said.

Though Apple has declined to comment on iPhone security issues, the company has more or less admitted iPhones are vulnerable to security threats, because an emergency measure exists. In August 2008, Apple CEO Steve Jobs acknowledged the existence of a remote kill switch for iPhone apps, meaning if a malicious app made its way onto iPhones, Apple could trigger a command to delete the app from users’ devices. There is no evidence that the kill switch has ever been used.

So, what kind of business should you do with an iPhone if the device is not very secure? Zdziarski said there are some business-savvy apps that have managed to integrate better security (such as secure data fields to prevent key-stroke logging of credit card numbers, for example), but he warned companies to be cautious about investing too much trust in the iPhone and the apps available for it.

“We’re going to have to go with the old imperative of ‘Trust no one,’” he said. “And unfortunately part of that is, don’t trust Apple.”

See Also:

Photo: Jon Snyder/Wired.com


Hitachi develops biometric payment system, uses it to sell junk food

Looks like Hitachi has made some serious headway on the biometric payment system we first heard about way back in the halcyon days of 2007. According to the Mainichi Daily News, the company is currently testing its Finger Vein Authentication System internally, with the device serving as a method of payment for vending machines and the like. Once it’s proven that employees are able to get their Koala’s March and Hi-Chew without incident, the plan is to up the ante, with high precision ID systems that combine finger vein and finger print authentication systems for military use.

Filed under:

Hitachi develops biometric payment system, uses it to sell junk food originally appeared on Engadget on Wed, 22 Jul 2009 13:13:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Etisalat BlackBerry update was indeed spyware, RIM provides a solution

Um, yikes? An unexpected (and unwanted) surprise struck some 145,000 BlackBerry users in the UAE this time last week, when an official looking prompt coerced many of the aforesaid Etisalat customers to follow through with a software update. Rather than bringing about performance enhancements, the SS8-built app enabled the carrier to keep tabs on customers’ messages. According to RIM:

“Etisalat appears to have distributed a telecommunications surveillance application… independent sources have concluded that it is possible that the installed software could then enable unauthorized access to private or confidential information stored on the user’s smartphone. Independent sources have concluded that the Etisalat update is not designed to improve performance of your BlackBerry Handheld, but rather to send received messages back to a central server.”

Like we said, yikes. The zaniest part is that Etisalat isn’t backing down, still assuring the world that the upgrades were “required for service enhancements.” At any rate, RIM has made remarkably clear that the update wasn’t one authorized by the company, and it’s even providing an app remover for those who’d prefer their BlackBerry to be in working order and, you know, not forwarding all their email to some dude in an Etisalat supply closet. Good on you, RIM. Bad on you, Etisalat.

[Thanks, Gerald]

Read – Confirmation of spyware
Read – RIM app remover

Filed under:

Etisalat BlackBerry update was indeed spyware, RIM provides a solution originally appeared on Engadget on Tue, 21 Jul 2009 09:41:00 EST. Please see our terms for use of feeds.

Permalink | Email this | Comments

Freecom’s Hard Drive Secure for the businessman paranoid

It might be a butchering of English grammar — the adjective typically goes before the noun — but the Hard Drive Secure does have a pretty unique selling point to offer. The USB 2.0 drive’s security is handled by AES-encrypted RFID keycards — swiping the card once unlocks the drive, swiping it again locks it back up. Using similar technology to London’s Oyster Card, we trust Freecom has made sure their new device is not susceptible to the Mifare hack that exposed vulnerabilities in previous RFID systems. Though not yet available to purchase, the aluminum-enclosed HDD will retail for between $119 for the 500GB version and $409 for the 2TB behemoth, while in Euroland prices will range between €99 and €349.

[Via Bit Tech]

Filed under:

Freecom’s Hard Drive Secure for the businessman paranoid originally appeared on Engadget on Mon, 20 Jul 2009 08:01:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

SwissMiniGun is World’s Smallest Revolver

minigun

The SwissMiniGun is officially the smallest gun in the world. Look at the picture on the right and it appears to be just a regular revolver, apart from the “oversized” trigger sticking out the bottom. One glance at the picture on the left, though, shows that it could easily be used as a key fob.

But don’t go hooking this up to your keys, at least not while it’s loaded: Somebody is bound to grab it and squeeze the trigger. If that happens, you’ll be picking 2.34mm caliber bullets out of your body for weeks.

The tiny gun is, of course, made in Switzerland and measures just 5.5cm (2.2 inches) long. The bullets, which are rim firing, are so small that they really won’t do too much damage. In fact, the makers want to be very clear about this:

We would like to take this opportunity to inform journalists who are interested in writing articles about our product that the power of most airguns or BB guns, which are in many countries freely on sale, can exceed over 10 times the power of our ammunition.

We do not wish to find on the web the same kind of nonsense article we have found lately.

Still, it would certainly sting, and could probably take your eye out. The gun costs a rather hefty 6,500 Swiss Francs, or just shy of $6,000. There is also a gold edition which can go for up to $50,000, but you’ll have to travel to Switzerland to buy one: While it is exported to some markets, the gun is actually too small for the US, and “does not meet with the minimum size prerequisites”.

Product page [SwissMiniGun via Oh Gizmo!]