iPhone includes app 'kill switch,' Jobs admits
Apple CEO confirms speculation about last-ditch option
Computerworld - Apple Inc.'s CEO, Steve Jobs, today confirmed that the company has a "kill switch" it can flip to remotely disable potentially malicious applications that have been downloaded to any iPhone.
In a story published this morning by The Wall Street Journal (subscription required), Jobs acknowledged that Apple could cripple applications previously downloaded to iPhone and iPod Touch devices.
The so-called kill switch is necessary as a last-ditch option should a malicious application slip through Apple's security checks and make it into the App Store, Jobs argued. "Hopefully we never have to pull that lever, but we would be irresponsible not to have a lever like that to pull," Jobs told the newspaper.
Apple controls which applications appear in its App Store.
Discussion of the switch started last week when Jonathan Zdziarski, a security researcher and author of a pair of books about iPhone development, said he had found a line in the phone's operating system that pointed to a URL. The link, said Zdziarski, led to a page that appeared to be an embryonic blacklist.
The URL, which points to an Apple server, currently contains only placeholder data.
Later, Zdziarski updated his site with more information. "With a little DNS spoofing, I fed my own list into the iPhone and effectively killed (by name) applications that attempt to use the GPS. It looks like that's all it's set to do right now, but I may just not have found the 'vaporize' switch," he said last Thursday.
"Either it is an anti-malware solution, and [the iPhone] has a switch somewhere to vaporize any app, or it's not an anti-malware solution and is really designed to kill applications that interfere with Apple's business model, such as unsanctioned traffic navigation software," he added.
Today, after the Wall Street Journal story appeared, Zdziarski speculated that the URL he had uncovered might only feed the actual kill switch, hidden elsewhere in the operating system. "Unless, for some reason, they decided to build two separate mechanisms into the iPhone to do this, of which the other one is invisible, this one likely feeds a 'master' kill switch. Perhaps there is a special setting in the configuration file which can vaporize the app all together," he said.
"It speaks poorly to the device," argued Andrew Storms, director of security operations at nCircle Network Security Inc. "You should never have been in that situation to begin with, and [it] again brings up the question, 'Is the iPhone really an enterprise device?"
A kill switch should be included in the iPhone's administrative tools, not set by Apple through a URL, Storms said. IT staffers can, for instance, remotely disable applications on a company-managed RIM BlackBerry.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Macintosh White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!