Secure Communications

Turning the iPhone Into a SpyPhone

If you know your target’s phone number, you could text message a link to a malicious Website, which would covertly install a third-party application executing malicious code. The corollary would be to send your target an e-mail with a nefarious attachment; he clicks on it and the attacker “owns” the phone. Or there’s always the “man-in-the-middle” (MITM) attack, which is perhaps the most James Bondian: You sit in, say, Starbucks with a laptop set up, as part of the ruse, to operate as a Wi-Fi access point, so a target’s Web browsing and e-mail pass through your computer first. (How can you tell who has an iPhone as opposed to someone with a standard laptop, rival smartphone, or PDA? Simple — the exploit only works on iPhones.)

Link to video

Link to article



November 17, 2007 - Posted by | cellular phone, eavesdrop, email, English, espionage, mobile, phone tap, privacy, security, spy, tap, technology, wireless, wiretap

1 Comment »

  1. The security concerns and spy capabilities around the iphone
    are some I never tough about before, interestingly.
    It’s an area I will definitely research more in depth and will add some content here if I find other things worth mentioning about The Iphone or other portal devices, like the blackberry etc.

    thanks for the great info

    Comment by Max Penn | December 15, 2007 | Reply

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: