Thursday, October 21, 2010

IPhone malicious worm is constantly looking for new "host"



Traditional common malicious code on the Internet, that is, we often mention the "worm", is looking for a new "host."

As mobile phones become increasingly powerful, malicious code attacks on a serious threat to these devices is growing, and computer criminals and further proof of this --- they used an improved version of iPhone (mobile Internet), the shortcomings, spread a programming theft Bank Information worms. Some experts said the worm may mark the invasion of criminals are more mobile devices access.

Crack version of iPhone has been a small number of "worms suffering"

Several researchers reported that the security firm, called "Ikee.B" or "Duh" of the new worm, can be installed on the iPhone using an improved version of the software's default password to spread. Once the equipment victim, the worm begins to crawl text messages, and search the bank for at least a bank authorization code, then the code sent to a central server. Earlier, another iPhone worms have appeared. Fortunately, it is only using the same password flaw to spread itself, but it does not attempt to steal personal information.

"The bank (attack) on the mobile device is very strange", antivirus company Sophos senior security consultant Charles Tovissi Kwasniewski (Chet Wisniewski) said. "It walk through your cell phone, get all your text messages and send them to a server in Lithuania."

It is understood that the worm will only cause inconvenience to a few people. Because of its attack affects only a small part of the content is modified, the software can be run on the ratified "cracked" version of iPhone. However, this does not mean that most of the iPhone is absolutely safe. Some researchers said the worm proved that their attacks can also "evolve" to harm more terminals. In addition, computer criminals are targeting portable devices, personal information and financial information to make such software more dangerous.

Smart phones more vulnerable

This summer, the Las Vegas Black Hat security briefing meeting, the Independent Safety Evaluation Association (IndependentSecurityEvaluators) consultant Charlie Miller (CharlieMiller) shows a cell phone text message to a remote attack by the methods iPhone. Miller said the goal of computer criminals to find out cell phone is only a matter of time, it will greatly expand the potential size of the virus.

"A more powerful worm will appear in Google's Android phones, Apple iPhone, and all other mobile phone. As more criminals involved in the invasion of how mobile phone platform, these devices will be attacked." Charlie m Le says.

Select smart phones, you should be prepared to bear such risk. iPhone and other smart phones, easily become a lawless molecular force's aim is similar to mini-computers --- they are often connected to the Internet, run third-party applications, and storage for computer criminals have the potential value of information.

Worms, all-pervasive

"Worms 'development' will continue." Miller said, although current research iPhone attack code, until a major outbreak of the worm is still a long way to go, such as the new worms are easily found, but in addition to the wireless network to transmit data, aggressive to infection than other phones, it can quickly consume the phone battery victims.

"Duh mentioned above Ikee.B or worm, the earliest dating back to 2000. To 2004, the first mobile phone worm Cabir special attack release. It can automatically between the Nokia Symbian mobile communication systems."

In 2006, the University of Toronto and Microsoft researchers showed that even among the close-and short-term mobile phone Bluetooth connection, in theory, can also be used for wireless worms. "Once the open Bluetooth, found loopholes in the outbreak of the worm is easy. An infected device in a busy shopping district in the city, in theory, can be opened by other Bluetooth-enabled mobile phones, to explore a large number of potential victims." Researchers so said.







Recommended links:



Smooth surface reflection effect oval button making techniques



Dreamweaver's CSS layout examples ul and li



Liu Liu Jiren, Etc. On New Overseas Opportunities: Pie Or Trap



Best Install And Setup



Recover your sim contacts



How to strengthen the promotion effect of media and public relations?



MKV To PSP



Hot SCIENCE Education



Chen Mei: The Change In Self-perfection



Articles about Games Simulation



Clocks And Alarms Guide



The fate of Sina and Sohu, Sina too poor to only ads



Open-source Third-polar World



On The Issue Of AutoCAD Customization In The Linear



RM to AVI



AVI to FLV



No comments:

Post a Comment