iPhone will be an attractive platform for hackers, as much to use it as offensive weapon like attacking it. To obtaining the data of smartphone of this type can be very valuable, since they are stored, in addition to phone numbers, names, directions, post office,… In addition, the fact of its connectivity, as much thanks to the Wi-Fi as to the EDGE, makes it more vulnerable .

The Metasploit project puts this a little close more, when adding support for the platform of iPhone to this set of utilities, that allow to the creation of shellcode and follow-on attacks. Clear that, first, it is necessary to find bug that allows to execute that code.
No comments:
Post a Comment