Premium Essay

Apple Devices Vulnerable to Attack Via Bogus Charger

In: Business and Management

Submitted By cathymeow
Words 321
Pages 2
Apple devices vulnerable to attack via bogus charger
IPhone 5
Any Apple device running the iOS operating system could be infected by the bogus charger

Apple iPhones can be taken over with "alarming" ease using a custom-built charger, security researchers warn.

Using the bogus charger, a team from Georgia Institute of Technology managed to infect a phone with a virus in less than a minute.

Any device using Apple's iOS operating system would be as vulnerable to infection, claim the trio.

More details of their work will be given at the upcoming Black Hat USA hacker conference.

Computer control
Brief details of the work were given in a summary of the talk the three researchers are scheduled to present at the hackers' get-together.

The researchers, Billy Lau, Yeongjin Jang and Chengyu Song, said they were able to get around the many defences in iOS to install any software they wanted on a target device.

"All users are affected, as our approach requires neither a jailbroken device nor user interaction," they wrote.

The team created their malicious charger using a tiny bare-bones computer called a BeagleBoard that costs about £30 ($45).

"This hardware was selected to demonstrate the ease with which innocent-looking, malicious USB chargers can be constructed," wrote the researchers in their conference summary.

This computer on the BeagleBoard communicates with the target computer and carries out the attack that loads malicious software. The researchers say they studied Apple's security systems closely to find a way round its attempts to stop attackers installing rogue programmes and apps.

The researchers hid the malicious application they installed by using the same method Apple employs to conceal the location of its own applications on iOS devices.

The presentation will also make recommendations about how Apple could close the…...

Similar Documents

Premium Essay


...Executive Summary :- Apple Inc. Wasw founded in Cupertino,California on April1,1976. Three cofounders were Mr.Steve Jobs , Mr.Steve Woznaik, Mr.Ronald Wayne. As on date only one founder from the original three remains with Mr.Steve Jobs being Co-founder, Chairman, and CEO. In Financial 2010 its revenue stood at $65.23 billion with total profit of $14.01 billion. Apple Computer, Inc. is an American multinational corporation that designs and markets consumer electronics, computer software, and personal computers. Best-known hardware products of the company are the Macintosh line of computers, the iPod, the iPhone and the iPad. Apple software includes the MAC OS xoperating system; the iTunes media browser; the iLife suite of multimedia and creativity software; the iWork suite of productivity software; Aperture, a professional photography package;Final cut studio, a suite of professional audio and film-industry software products; Logic Studio, a suite of music production tools; and iOS, a mobile operating system. In August 2010 company was operating 301 retail stores in ten countries and also an online store where hardware and software products are sold. May 2010, Apple is one of the largest companies in the world and the most valuable technology company in the world which has surpassed even Microsoft, its main competitor. Apple Inc was Incorporated on January 3, 1977.The company operated under the name of Apple Computer, Inc., for its first 30 years. Jobs, who assumed the......

Words: 7458 - Pages: 30

Premium Essay


...APPLE INC IN CONSUMER ELECTRONICS (WORLD) December 2011 SCOPE OF THE REPORT Scope  This profile of Apple Inc focuses on its operations in consumer electronics as well as its product distribution lines, and examines future opportunities and challenges for the company globally. Disclaimer Much of the information in this briefing is of a statistical nature and, while every attempt has been made to ensure accuracy and reliability, Euromonitor International cannot be held responsible for omissions or errors. Figures in tables and analyses are calculated from unrounded data and may not sum. Analyses found in the briefings may not totally reflect the companies’ opinions, reader discretion is advised. Apple Inc Consumer electronics Retailing Portable computers Electronics and appliance specialist retailers Portable media players Internet retailing This profile of Apple Inc examines the company’s operations in consumer electronics and retailing, with a focus on forward looking analysis of its prospects in computers and portable consumer electronics. A brief overview of Apple Inc’s content retailing and operational specifics is provided to supplement the core analysis. Smartphones © Euromonitor International CONSUMER ELECTRONICS: APPLE INC PASSPORT 2 STRATEGIC EVALUATION COMPETITIVE POSITIONING MARKET ASSESSMENT CATEGORY OPPORTUNITIES BRAND STRATEGY OPERATIONS RECOMMENDATIONS STRATEGIC EVALUATION Key company facts Apple......

Words: 4840 - Pages: 20

Premium Essay

Mobile Device Attacks

...Mobile Device Attacks and Their Effect on Your Personal Privacy CIS 4680- Security Issues Paper (Group 6) Over the last decade, smartphones have become more and more popular as the new handheld PC. With its processing power catching up with the PC, it brings much convenience to people’s daily life from fast access to latest information to efficient financial activities. However, with this increase in use of these functions, more security threats have aroused surrounding smartphones. As the mobile operation systems in different devices become more, it is opens more possibility for fast virus propagation and large scale damage. There have been several attacks targeting smartphones and it is a trend that hackers are moving the battlefield from PCs to smartphones because of promising profit and smartphones’ limitations for antivirus work. Hackers are migrating to the new smartphone platform for many reasons. Not only is the profit from smartphone hacking increasing, but as more consumers link their personal accounts (email, social networking, financial, etc.) to their smartphones, the private information of the users opens a window of opportunity. Hackers can infect smartphones to record phone calls, send and delete data messages, and spy on your phone’s activity. It does not only pose great security threats, but also causes an economic loss to common users. This definitely becomes a major issue when businesses are also taking advantage of the portable PC power of......

Words: 3045 - Pages: 13

Premium Essay

Mobile Device

...Mobile Devices Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs (Patricia & Donna, 2008). In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.  Risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. This open connectivity brings with it risks, however, some of which are similar to those in......

Words: 671 - Pages: 3

Premium Essay

Beech-Nut's Bogus Apple Juice

...face with strong evidence that Beech-Nut apple juice for babies was made from concentrated that included no apples. The concentrated was bought from the supplier of the low-cost apple concentrated, Universal Juice Company since 1977. First investigation by two employees of Beech-Nut showed that there are presence of corn syrup, but the Vice President of Beech-Nut, Mr. Lavery dismissed the report. A turning point occurred when investigation by private investigator showed that Universal plant only produced sugared water and invited Beech-Nut to join a suit against Universal. Some of the executives have urged Hoyvald to switch the supplier and recall all the apple juice on the market, but he was hesitant because he claimed that even if the apple juice was bogus, no evidence that the juice was harmful. Switching supplier required Beech-Nut to pay additional cost of $750,000 for the juice and recalling all the apple juice on the market would cost about $3.5 million and means that they are admitting that the company has sold adulterated product. He also said that it tasted like apple juice and it surely provide some nutrition. Furthermore, he had promised his Nestle superior that he would return a profit of $7 million for the year. Recalling all the juice on the market and changing supplier means that he failed to keep the promise to his superior. Fearful that state and federal investigators might seize stocks of bogus apple juice, Hoyvald had taken several action...

Words: 383 - Pages: 2

Free Essay

Apple Preference Mapping Via Pca Methods

...Apple Preference Mapping A central location trial was conducted for 10 dessert apple varieties using participants from Bristol and Hull. The following presentation will analyse the statistical results gained from the data received and suggest areas for future product launches within the UK apple industry. Task 1 Recruitment of Panellists The Market Research Company was asked to recruit 100 Panellists in each city for the trial with 50% of the panellists from each age group (1 & 2). The data shows that the number of people recruited in Bristol exceeded the required amount with a total of 169 Panellists. Further to this, 71% of the panellists recruited were from the age bracket 2. Recruitment in Hull matched closely to the total requirement of panellists, however again the recruitment favoured towards the age bracket 2 with 73% coming from this. The company therefore exceeded the total requirement of panellists by 71 people. Sum of Age City Bristol Bristol Total Hull Hull Total Grand Total Age 1 2 1 2 Total 49 120 169 28 74 102 271 Task 1 Overall Mean Liking Data Average of Top Red Average of Gibson's Green Average of Royal Gala Average of Braeburn Average of Fuji Average of Pink Lady Average of Granny Smith Average of Sun Gold Average of Johnson's Red Average of Golden Delicious Total 4.290229885 4.5 4.790229885 5.324712644 5.483908046 5.701149425 5.713218391 5.876436782 6.094252874 6.962643678 Overall Golden Delicious had the highest mean liking with a......

Words: 1773 - Pages: 8

Free Essay


...APPLE INC IN RETAILING (WORLD) June 2014 SCOPE OF THE REPORT Scope All values expressed in this report are in US dollar terms, using a fixed exchange rate (2013). 2013 figures are based on part-year estimates. All forecast data are expressed in constant terms; inflationary effects are discounted. Conversely, all historical data are expressed in current terms; inflationary effects are taken into account. Retailing Disclaimer Much of the information in this briefing is of a statistical nature and, while every attempt has been made to ensure accuracy and reliability, Euromonitor International cannot be held responsible for omissions or errors. Figures in tables and analyses are calculated from unrounded data and may not sum. Analyses found in the briefings may not totally reflect the companies‟ opinions, reader discretion is advised. Non-Store Retailing Internet Retailing Non-Grocery Retailers Electronics and Appliance Specialist Retailers Apple Inc, goes from strength to strength thanks to unparalleled consumer loyalty and brand equity, superlative store experiences, a strong portfolio of products and a customer service strategy that sets it apart from its rivals. Lacking strong leadership store sales have struggled - sales per store in 2013 were flat. Appointment of ex Burberry CEO as new VP of Retail and Online is expected to provide much needed boost to Apple retail operations – both in store and online. STRATEGIC......

Words: 7904 - Pages: 32

Premium Essay

Apple Security

...Jackson Is User Security as Important to Apple as They Say? Over the last couple of weeks, multiple nude photos of celebrities have been (and continue to be) leaked due to a hacker being able to figure out the usernames and passwords to their Apple iCloud accounts. Celebrities such as Jennifer Lawrence, Rihanna and Jenny McCarthy have been affected by this recent hack but they’re just the tip of the iceberg.  Apple’s investigation is ongoing but they released a statement through Spokeswoman Natalie Kerris saying that they “take user privacy very seriously and are actively investigating this report.” This recent infiltration of Apple’s iCloud made me realize how much we as a society use our phones to do almost everything (taking photos/videos, paying bills, managing bank accounts, etc…). More importantly it made me wonder how safe this information on our phones really is. Obviously the security measures in place at Apple aren’t what they should be if a hacker can run a simple “common password” software and potentially access the personal files of any user they choose. This security breach made me step back and take a look at not only Apple’s current security measures but those of other companies/phone carriers. This controversy has raised many questions, the most important of those questions being whether Apple and other companies are taking user security as seriously as they lead us to believe and the answer to that question is no. Apple dropped the ball by not addressing......

Words: 1695 - Pages: 7

Premium Essay

Modifying Software on Apple Devices

...Modifying Software on Apple Devices My Name Class Teacher 29 May 2013 Modifying Software on Apple Devices Apple, Inc. completely changed our view of cell phones and computers when it introduced the first iPhone in 2007 (Miller). With such an amazing, versatile technology entering the world marketplace, iPhone security immediately became an issue. “Jailbreaking,” or modifying the iPhone’s software to allow complete control over it, quickly became popular. Over the course of the iPhone’s existence, jailbreaking has become more and more important in the Apple community. However, jailbreaking has also struck up much controversy as its legality and effects are questioned. The word “revolutionary” is an understatement when describing the iPhone. This single device kicked off a technological revolution in which personal computers were redefined. Prior to the iPhone, the most advanced cell phones had only very basic web browsers, poor cameras, and simple user interfaces. With the iPhone came a much faster web browser, photo and music storage, a nicer camera, and the iPhone’s touch screen display made the device extremely intuitive and user-friendly. However, this first iPhone had many shortcomings to be fulfilled. Data speeds were lacking, the operating system had little security, and the user could not install non-Apple, or third-party, apps (Miller). The iPhone’s first operating system was named after Apple’s computer operating system, “OS X”. Cisco’s operating......

Words: 2781 - Pages: 12

Free Essay

It Has Been Said That a Smartphone Is “a Microcomputer in Your Hand.” Discuss the Security Implications of This Statement. Most People Are Unaware That Their Cell Phones Are Just as Vulnerable to Cyber Attacks as Their

...Study One Read the following case and answer questions below. How Secure Is Your Smartphone? Have you ever purchased antivirus software for your iPhone, Android, or cell phone? Probably not. Many users believe that their iPhones and Androids are unlikely to be hacked into because they think Apple and Google are protecting them from malware apps, and that the carriers like Verizon and AT&T can keep the cellphone network clean from malware just as they do the land phone line system. (Telephone systems are “closed” and therefore not subject to the kinds of the attacks that occur on the open Internet.) Phishing is also a growing smartphone problem. Mobile users are believed to be three times more likely to fall for scams luring them to bogus Web sites where they reveal personal data: Why? Because mobile devices are activated all the time, and small-screen formatting makes the fraud more difficult to detect. So far there has not been a major smartphone hack resulting in millions of dollars in losses, or the breach of millions of credit cards, or the breach of national security. But with 74 million smartphone users in the United States, 91 million people accessing the Internet from mobile devices, business firms increasingly switching their employees to the mobile platform, consumers using their phones for financial transactions and even paying bills, the size and richness of the smartphone target for hackers is growing. In December 2010, one of the first Android botnets,......

Words: 2351 - Pages: 10

Free Essay


...likelihood that your system has an exposed vulnerability on it. Mac Firmware Worm Discuss the threat While the amount of Mac-based crapware, homepage hijackers, and content trackers has been steadily rising for the last few years, it’s always been (incorrectly) assumed that Apple systems are locked down in ways that Windows-based PCs aren’t – thus making them almost invincible to the torrent of attacks that Microsoft users have to withstand. A little under a month ago, news broke that two white hat researchers had successfully created the world’s first firmware worm for Mac. Degree of damage While this worm isn’t “on the market” at the moment – the proof-of-concept virus is dangerous. It can be delivered either via an email, an infected USB stick, or a peripheral device (like an Ethernet adaptor). Once it’s on your machine it cannot be removed from the firmware manually (you’d have to re-flash the chip), and it can’t be detected by any existing security software. If the concept has been proved, it’s only a matter of time until black hat hackers start exploiting it. If you’re a Mac user, take appropriate security steps now. What it attacked A firmware worm is a type of attack that targets the part of a computer responsible for booting it up and launching the operating system. On Windows machines, that can include BIOS (Basic Input/Output System). On the Mac, it's EFI (Extensible Firmware Interface). Bugs in BIOS or EFI code create vulnerabilities in the......

Words: 2057 - Pages: 9

Premium Essay

Increasing Attacks on Cloud Platforms

...SECURITY TERM PAPER TWO Living with Increasing Attacks on Cloud Computing Platforms Cloud Computing is an on demand, flexible and cost friendly delivery platform that has provided IT consumers and organizations services such as networks, storage, servers and applications over the Internet. Its importance is increasing as a large number of industrial and technological communities are rapidly adopting it. The benefits such as low cost and convenience of cloud computing services have significantly changed our day to days activities, however, there are numerous security issues facing cloud computing making it difficult to maintain data security and privacy, support data and service availability and demonstrate compliance. These issue also make cloud vulnerable to exploitation by attackers. The three cloud services models used today are Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS).Iaas provides the most dynamic functionality since it is based as the underlying layer in cloud. It widens the resilience for users to design a practical environment that includes virtual machines running with different operating systems. This may pose as a vulnerability since an attacker could lease these virtual machines, analyze their configurations, find their vulnerabilities, and attack other customers’ virtual machines within the same cloud. Brute force and Distributed denial of service (DDoS) attacks could also take place in Iaas as it provides......

Words: 1310 - Pages: 6

Premium Essay


... |Thiam Yee Hwa, Clara (u3049098 ) | |Unit name | Strategic Management | |Unit number | 7371 | |Name of UC lecturer/ Local tutor | Dr Majharul Talukder / Mr Sadanand Varma | |Program | BBA | |Assignment name | Strategic Management – Case Analysis (Apple) | |Due date | 9th March 2012 |   You must keep a photocopy or electronic copy of your assignment.   Student declaration I certify that the attached assignment is my own work. Material drawn from other sources has been acknowledged according to unit-specific requirements for referencing. Signature of students: ____________________________________  Date: 9 Mar 2012 Assignment feedback |Assessment criterion |Comments |Marks | | ...

Words: 9350 - Pages: 38

Premium Essay


...methods to ensure greater security for customers. Internet Technology, Marketing, and Security 2 To understand Apple, we must first know the innovative mind behind the company, and it products. Steve Jobs revitalized the company back in the early 1990’s with such products as iMac using effective branding campaigns, stylish designs which caught the attention of consumers. He introduce the world to products such Macbook Air, iPod, and iPhone. These devices later paved the way for his newest intervention Ipad which is primarily a platform for audio-visual media including books, movies, games and apps. Steve Jobs died on October 5, 2001, but not his dream of building products to capture the imagination of consumers. He once stated “your time is limited, so don’t waste it living someone else’s life. Don’t be trapped by dogma – which is living with the results of other people’s thinking. Don’t let the noise of other’s opinions drown out your inner voice. And most important, have the courage to follow your heart and intuition. They somehow already know what you truly want to become. Everything else is secondary.” As we look at Apple’s iPad, it is innovative and powerful. It is first product Apple’s wants the consumer to see when you search for an apple product on The website has six major icons to choose to purchase their products. The website is very user friendly and the products are......

Words: 1623 - Pages: 7

Premium Essay

Wireless Devices

...TM 562: Wireless Devices and Applications Table of Contents Introduction 1 Background about Smartphones 1 Defined Smartphone 1 Different applications on a Smartphone 1 Problem Statement 3 Security Risks 3 Analysis 4 Viruses 4 Threats 5 Recommended Solution and Implementation 6 6 6 References 7 Introduction Statement If you've ever wondered exactly what a smartphone is, well, you're not alone. How is a smartphone different than a cell phone, what makes it so smart, and how secure is the device? Firstly, IBM designed the first smartphone in 1992. It was called Simon. The smartphone was presented that year as a concept device in Las Vegas at the computer industry trade show known as COMDEX. The first cell phone, on the other hand, was demonstrated 19 years before the first smartphone (Wikipedia). Smartphones are phones that provide a new genre of application than the standard cell phone. They provide phone plus Internet connectivity and storage, text and multimedia, and multi-tasking. In a nutshell, a smartphone is a device that lets you make telephone calls, but also adds in features that you might find on a personal digital assistant or a computer, such as the ability to send and receive e-mail, scheduling and contact management software, edit Office documents, as well as a built-in camera and mp3 capabilities. However, with the access to the Internet the phone is now subjected to more security issues. If a person can hack......

Words: 2102 - Pages: 9