Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Vehl

(1,915 posts)
Sat Mar 17, 2012, 04:33 PM Mar 2012

Loose-lipped iPhones top the list of smartphones exploited by hacker

As a security professional who gets paid to hack into high-value networks, Mark Wuergler often gets a boost when his targets use smartphones, especially when the device happens to be an iPhone that regularly connects to Wi-Fi networks.

That's because the iPhone is the only smartphone he knows of that transmits to anyone within range the unique identifiers of the past three wireless access points the user has logged into. He can then use off-the-shelf hardware to passively retrieve the routers' MAC (media access control) addresses and look them up in databases such as Google Location Services and the Wireless Geographic Logging Engine. By allowing him to pinpoint the precise location of the wireless network, iPhones give him a quick leg-up when performing reconnaissance on prospective marks.

..
..

The exposure of MAC addresses extends not only to iPhones, but to all Apple devices with Wi-Fi capabilities, he said. It means that whenever the wireless features are enabled and not connected to a network—for instance, during a brief encounter at a Starbucks—they broadcast the unique identifiers, and it's trivial for anyone nearby to record them.

Apple did not respond to our requests for comment for this article.

more here
http://arstechnica.com/apple/news/2012/03/loose-lipped-iphones-top-the-list-of-smartphones-exploited-by-hacker.ars?clicked=related_right


Screenshot of information gleaned from Apple products due to this flaw, by the Security analyst. Hackers have access to this information

[IMG][/IMG]


Edited to add: Right click and select "view image" to view a high-res version of the image.

Contact details
Called list.
images.
apps..everything is accessible to the hacker.


^^ So much for the "it just works" by the most "innovative" company. It just works ...by being the most insecure consumer device on market, according to the article. It takes special skill all right.....after all its not easy for a company to have this bug in ALL of its Wifi-capable devices.

This just underscores what non Apple users have been saying all along..that the claims that Apple products are more secure, more stable are flat out wrong, and do not have any statistics backing them up. People willingly pay hundreds if not thousands of $$$ more for stuff that is essentially no different(at times even less capable) from the other stuff out there.


on a related note

Study shows Ios more prone to crashes than Andorid.
http://www.forbes.com/sites/tomiogeron/2012/02/02/does-ios-crash-more-than-android-a-data-dive/

9 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Loose-lipped iPhones top the list of smartphones exploited by hacker (Original Post) Vehl Mar 2012 OP
This info will never penetrate the RDF tridim Mar 2012 #1
I expect... Ron Obvious Mar 2012 #2
I don't have wifi and this is why. applegrove Mar 2012 #3
Spam deleted by Morning Dew (MIR Team) GregHackShop Mar 2012 #4
Haters gonna hate. Ron Green Mar 2012 #5
As I have said before, DON'T BE AN iDouche. mt madinmaryland Mar 2012 #6
:) Vehl Mar 2012 #7
Please stop bashing Apple fans. That said, the thing that keeps catching my attention is that Zalatix Mar 2012 #8
Apple made the switch to Intel several years ago, and many fans did mourn Thegonagle Mar 2012 #9
 

Ron Obvious

(6,261 posts)
2. I expect...
Sat Mar 17, 2012, 05:51 PM
Mar 2012

The exposure of MAC addresses extends not only to iPhones, but to all Apple devices with Wi-Fi capabilities, he said. It means that whenever the wireless features are enabled and not connected to a network—for instance, during a brief encounter at a Starbucks—they broadcast the unique identifiers, and it's trivial for anyone nearby to record them.


I expect someone will come along and tell us this is actually a good thing and a wonderful feature soon.
 

Zalatix

(8,994 posts)
8. Please stop bashing Apple fans. That said, the thing that keeps catching my attention is that
Thu Mar 22, 2012, 04:55 AM
Mar 2012

Macintoshes now use the Intel processor.

If I were an Apple fan, I would have wept over that. Part of my desire to get an Apple was that it used a different type of processor. I liked the Power chip, I have a newer-generation Amiga armed with one of those.

Thegonagle

(806 posts)
9. Apple made the switch to Intel several years ago, and many fans did mourn
Thu Mar 22, 2012, 06:12 AM
Mar 2012

the passing of the Motorola PowerPC era.

But times change, and Motorola could no longer keep up with Apple's requirements, so they switched to someone who could.

Oh well, technology marches on. At least now, really, really patient types can build a "Hackintosh," a computer based on a PC motherboard/processor combo that runs Mac OSX. (Building such a beast is not without its challenges, and I haven't tried it myself, but it apparently works for many.)

Latest Discussions»General Discussion»Loose-lipped iPhones top ...