Thursday, September 16, 2010

iPhone Hacks


iPhone Hacks & Software - Getting Closer to iPhone Unlocking

Executive Summary about iPhone Hacks by Philip Nicosia 

With the iPhone news of the Apple launch, the number of iPhone hacks has increased exponentially and a great deal of energy has been put into working through the iPhone software to find where the passwords and the “glue” is for a number of apps. The “Holy Grail” at the moment is iPhone unlocking.

iPhone unlocking is in fact most requested hack, and unlocking means that the iPhone can be used on any network and not just AT&T’s. Sieving through the iPhone software and especially the gif images that are embedded seems to be the number preoccupation of any self respecting iPhone hack merchant around the globe.

On the iPhone news grapevine, it’s not just iPhone hacks that are streaming in thick and fast, there are also a series of full-blown web apps which I have to say is pretty impressive – well done guys!

Probably the best one at the moment is the iPhone hack “iChat for iPhone” which provides you with IM capability on AIM.  If you are really serious about keeping up-to-date with the latest in iPhone unlocking and iPhone hacks then check out the iPhone Dev Wiki that seems to me to be the closest to getting an iPhone unlocking hack.

iPhone software that you can download onto your new iPhone can be found at iPhone Applications on the web. Unfortunately, until we get iPhone hack that will open up the iPhone to third party applications we are going to have to make do with Apple iPhone software that we’re allowed to play with at the moment.

iPhone Hacks and Threats to Personal Privacy

Executive Summary about iPhone Hacks by Mohammed Bhimji

In an article in the New York Times Technology section from July 23, 2007, an iPhone flaw was found to let hackers take over the iPhone. Remember that most people store entire lives on their digital assistants (whether this is a Smart Phone, the iPhone or even a PDA).

They keep names, addresses, phone numbers, e-mail addresses on them. Now imagine if a hacker has access to all this data. The security firm, Independent Security Advisors found that through common flaws (and without even hacking into the phone) they were able to gain unauthorized access to the contents of the phone through a WiFi connection or by tricking users into visiting websites that insert malicious code onto the phone.

The hack enabled the firm to gain a wealth of personal information that the phone contained.
Since the Apple iPhone has automatic updates, always ensure your iPhone has the latest updates by visiting the manufacturer’s site.

No comments:

Post a Comment