"All iPhone applications run with full root privileges and any application vulnerability means winner takes all. The iPhone has been turned into a 'pocket-sized … network-enabled root shell,' said H.D. Moore, thanks to the well-known security researcher having published shell code for the smart phone and instructions on how to use it as a portable hacking platform."
If you have an IPhone beware and don't make it an IBrick!
Thanks KoffeeBeanz
AlaskaJoe
No comments:
Post a Comment
All comments are moderated.
Note: Only a member of this blog may post a comment.