A vulnerability in the security iOS allows applications to perform malicious code

According to Forbes, a security expert Charlie Miller has found an exploit in iOS-devices, through which developers can place malicious applications in App Store, and while they will not find Apple. Then developers may at any time to use these programs to steal your contacts, photos and other information to make your phone vibrate lose it(…)

Hackers have created the first Trojan to lock iOS screen

Members of popular mobile platform iOS – Smartphone Apple iPhone, iPad tablet and player iPod touch – the first time confronted with the programs of-blockers, which block the function creates the illusion of your browser and extort money in exchange for unlocking, experts said on Friday antivirus company Doctor Web . According to them, this is the(…)

Five vulnerabilities in not yet released iPhone 5

At the conference MyGreatFest, held in London, a team representative Chronic Dev Team, known as P0sixninja, reported that they found five vulnerabilities Jailbreak iPad 2. But the main thing – it will make the iPhone 5 jailbreak immediately after its release. Hackers are going to release the appropriate tools immediately after the official release iOS 5.Place them(…)

Android overtake iOS by downloading applications in 2011

According to research firm Ovum, it is expected that this year will surpass the Android Apple applications on the number of downloads from its online stores, as demand for applications continues to grow. Report Company Mobile Application Download and Revenue Forecast: 2011-16 predicts that Android users will download apps 8.1 billion during 2011, compared with 1.4 billion(…)

Black Hat: iOS debugger is useless for all … but hackers

An independent security consultant Stefan Esser fame Earlier this year, when the technique he developed for hacking iPhones, was picked up by other dzheylbreykingovymi JailbreakMe and services. Britain’s The Register was “catch” German researcher at security conference Black Hat in Las Vegas as on the eve of his planned presentation, entitled “Operation of the kernel(…)