Security update wipes out unofficial iPhone mods
Apple released the update yesterday to fix critical flaws
IDG News Service - A security update for Apple Inc.'s iPhone does more than just fix critical flaws in the handset. It also looks for and wipes out any modifications that users make to the iPhone's firmware, according to hackers looking to unlock the phone.
But the security update does not break any of the tools that hackers have so far developed to modify the firmware, they said.
The iPhone Version 1.0.1 update primarily addresses a security flaw uncovered in the handset's Safari browser set to be detailed this week at the Black Hat 2007 conference in Las Vegas. That vulnerability, uncovered by researchers at Independent Security Evaluators (ISE), allows an attacker to access data and applications on the phone from a Wi-Fi access point or a malicious Web site.
When the update installs itself via iTunes, it also checks for changes that have been made to the phone's firmware, the hackers said. When changes are detected in the old firmware, the update wipes the phone and then reinstalls the updated firmware, erasing any modifications that a user made.
Hackers involved with efforts to unlock the iPhone at the #iphone Internet Relay Chat (IRC) channel were still coming to grips with the impact of Apple's security update today, looking to test whether tools they developed continue to work. (Hackers have asked journalists not to publish links to their site, iPhone Dev Wiki, saying it's not able to handle heavy volumes of traffic.)
Initially, the Apple security update appeared to block the ability to write files on the iPhone using the Jailbreak feature of the iActivation tool developed by the hackers, meaning the tool could no longer be used to add personalized ringtones to the phone.
However, the 1.0 version of Jailbreak continues to work fine, according to an update on iPhone Dev Wiki.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Infographic: Converged Infrastructure Benefits This Infographic quantifies the savings organizations are realizing from increased deployment speed, higher availability, and lower annual costs.
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
- Going Paperless? Here's What You Need to Think About As makers of some of the world's most popular PDF solutions, we often consult with businesses & governmental agencies that have the goal...
- The Big Data Opportunity for HR and Finance If CEOs, CFOs, CIOs, and CHROs want to drive their businesses forward, they will need to quickly recognize the enormous value of big...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Macintosh White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!