Security update wipes out unofficial iPhone mods
Apple released the update yesterday to fix critical flaws
IDG News Service - A security update for Apple Inc.'s iPhone does more than just fix critical flaws in the handset. It also looks for and wipes out any modifications that users make to the iPhone's firmware, according to hackers looking to unlock the phone.
But the security update does not break any of the tools that hackers have so far developed to modify the firmware, they said.
The iPhone Version 1.0.1 update primarily addresses a security flaw uncovered in the handset's Safari browser set to be detailed this week at the Black Hat 2007 conference in Las Vegas. That vulnerability, uncovered by researchers at Independent Security Evaluators (ISE), allows an attacker to access data and applications on the phone from a Wi-Fi access point or a malicious Web site.
When the update installs itself via iTunes, it also checks for changes that have been made to the phone's firmware, the hackers said. When changes are detected in the old firmware, the update wipes the phone and then reinstalls the updated firmware, erasing any modifications that a user made.
Hackers involved with efforts to unlock the iPhone at the #iphone Internet Relay Chat (IRC) channel were still coming to grips with the impact of Apple's security update today, looking to test whether tools they developed continue to work. (Hackers have asked journalists not to publish links to their site, iPhone Dev Wiki, saying it's not able to handle heavy volumes of traffic.)
Initially, the Apple security update appeared to block the ability to write files on the iPhone using the Jailbreak feature of the iActivation tool developed by the hackers, meaning the tool could no longer be used to add personalized ringtones to the phone.
However, the 1.0 version of Jailbreak continues to work fine, according to an update on iPhone Dev Wiki.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Macintosh White Papers | Webcasts