Intel's Moorestown would make iPhone less secure, says researcher
Swapping out the iPhone's ARM chip could lead to trouble
"That will make the iPhone x86, and that will make a lot of attacks easier," said Dino Dai Zovi, an independent security researcher, in an interview at the Hack In The Box security conference in Kuala Lumpur, Malaysia.
Apple Inc. has never said it intends to use Moorestown in future products, but Intel is widely believed to be hopeful that Apple will adopt the chip package.
Due for release in 2009 or 2010, Moorestown is a chip package designed for smart phones and other handheld computers. The heart of the package is an upcoming version of Intel's Atom processor, an inexpensive low-power x86 processor.
"The iPhone uses the Arm processor, and most people are not familiar with it," Dai Zovi said, noting that x86 processors are familiar territory for malware writers and hackers looking for vulnerabilities. "If you're doing exploits and vulnerability research, you need to know the specifics of the processor that's running," he said.
Dai Zovi is a well-recognized figure in computer security circles and is widely known for winning a 2007 hacking contest that involved hacking into a MacBook Pro laptop. The feat by Dai Zovi and partner Shane Macaulay won them the MacBook Pro as well as a $10,000 prize, and it laid to rest popular misconceptions that Mac OS X was somehow immune from the type of security vulnerabilities that affect Windows-based computers.
Intel executives declined to comment on Dai Zovi's remarks, saying any discussion of a Moorestown-based iPhone is purely hypothetical. In addition, they said Intel's policy is to decline comment on other companies' products.
Mac OS X is generally seen as being safer than Windows, because the small market share of Mac OS X means most malware writers and hackers choose to focus their efforts on Windows instead. But that could change as iPhone sales boost the number of Mac OS X users.
"The iPhone is another OS X platform, and whereas now the market share for OS X is definitely under 10% on desktops, on smart phones, they recently sold more phones than RIM," Dai Zovi said, referring to the maker of the BlackBerry line of handheld devices.
The iPhone runs a slimmed-down version of Mac OS X, the operating system used in Apple's desktop and laptop computers. As a result, some of the security features that are included in the desktop version of Mac OS X are not included in the phone version.
"The iPhone is significantly less secure than the desktop version of OS X," Dai Zovi said.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap® Recovery Manager can make your application recovery fast and reliable.
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts