In the group’s research paper titled ‘Evil Never Sleeps’ posted last week, they were able to install malware on the Bluetooth chip. Moreover, the researchers say that hackers would need to first jailbreak the iPhone before exploiting the Bluetooth chip that would give them access to other places to collect data. Ultimately, researchers conclude that Apple’s implementation of the new functionality is for the security benefit of the users since it allows them to find a lost or stolen iPhone even when turned off, but it also poses a novelty threat. “[Low-Power Mode] is a relevant attack surface that has to be considered by high-value targets such as journalists, or that can be weaponized to build wireless malware operating on shutdown iPhones,” the paper stated. After over two weeks of using the iPhone 3G, I can fairly say I have become familiar with this mobile device to share some insights on how it fares as a primary mobile phone. In a way, I regard the iPhone 3G primarily as an internet device and media player that has the cute feature allowing you to make calls and send SMS. That being said, if you are a heavy SMS user, then the iPhone is not for you. Read more in our articles including "Your iPhone is still hackable even when powered off, researchers show" and "JBL Celebrates 80 Years with New PartyBox Speakers, EasySing Karaoke Gear, Gaming Headsets, and more in PH".
In the group’s research paper titled ‘Evil Never Sleeps’ posted last week, they were able to install malware on the Bluetooth chip. Moreover, the researchers say that hackers would need to first jailbreak the iPhone before exploiting the Bluetooth chip that would give them access to other places to collect data.
Ultimately, researchers conclude that Apple’s implementation of the new functionality is for the security benefit of the users since it allows them to find a lost or stolen iPhone even when turned off, but it also poses a novelty threat. “[Low-Power Mode] is a relevant attack surface that has to be considered by high-value targets such as journalists, or that can be weaponized to build wireless malware operating on shutdown iPhones,” the paper stated. After over two weeks of using the iPhone 3G, I can fairly say I have become familiar with this mobile device to share some insights on how it fares as a primary mobile phone.
Our coverage of iPhone malware includes: "Your iPhone is still hackable even when powered off, researchers show"; "JBL Celebrates 80 Years with New PartyBox Speakers, EasySing Karaoke Gear, Gaming Headsets, and more in PH"; "iPhone 3G: The Good, the Bad and the Ugly". Each article provides unique insights and information.