Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Manage Multiple ChronoSync Documents

If you have multiple ChronoSync documents and need to run your syncs or backups manually, you may find it taxing to open each ChronoSync document and execute it manually. There are two easy methods to simplify managing multiple ChronoSync documents.

  • You can add the ChronoSync documents to a Container document. A Container holds multiple ChronoSync documents and enables you to control several ChronoSync documents as if they were one document.
  • You can make use of the Scheduled Documents Manager window to collect and organize commonly used ChronoSync documents without scheduling them.

Both methods allow you to schedule or manually run your syncs and backups.

Visit ChronoSync Tips

 
 

Apple Fixes Serious iPhone SMS Vulnerability

Send Article to a Friend

At this year's Black Hat security conference, one of the largest conferences on Internet and computer security, researchers demonstrated the potential for SMS-based attacks on the iPhone that could disable the device or extract sensitive information from it. Although Apple reportedly was informed of the vulnerability 6 weeks ago, the company released iPhone OS 3.0.1 on 31-Jul-09, the day after the demo. The update is available now, via iTunes.

Researchers Charlie Miller and Collin Mulliner, of Independent Security Evaluators, issued a denial-of-service attack on CNET correspondent Elinor Mills's iPhone by sending her a specially crafted SMS message, or more accurately, hundreds of specially crafted SMS control messages, only the first of which was seen.

While the researchers only showed how attackers might use the method to disable a user's phone, Miller said it was also possible to utilize this exploit to steal data, make calls, and send text messages. In fact, once having gained access to a user's phone, an attacker could then spread the attack further by sending SMS messages to the numbers listed in the address book.

While a reboot would restore functionality to a disabled phone and is about all a user could do, it takes only seconds for an attacker to swipe sensitive data and gain access to the address book. Worse, although we haven't seen commentary about this, since SMS uses a store-and-forward mechanism, messages sent while a phone was turned off would theoretically be delivered as soon as it was turned back on.

What's especially dangerous about this attack is that it requires no action on the part of the user. Typically, iPhone attacks involve tricking the user into visiting a malicious Web site or opening a specially crafted file - thus giving potential victims at least some agency in their defense - but this one only requires that the attacker has the user's phone number.

The exploit was made possible by a memory corruption bug in the way the iPhone handles SMS messages, and affects all versions of the iPhone OS before 3.0.1. If you haven't yet updated to iPhone OS 3.0, now is your chance to go all the way to 3.0.1 and eliminate your vulnerability to this SMS vulnerability.

SMS-based attacks aren't unique to the iPhone, with Miller and Mulliner also demonstrating this particular bug on an Android-based phone. Google patched the hole in Android last week, within a few days of being notified.

 

Make friends and influence people by sponsoring TidBITS!
Put your company and products in front of tens of thousands of
savvy, committed Apple users who actually buy stuff.
More information: <http://tidbits.com/advertising.html>
 

Comments about Apple Fixes Serious iPhone SMS Vulnerability

Jack Hayes  2009-08-01 15:35
Your title is misleading. Apple didn't fix an SMS attack, they fixed an SMS vulnerability that could subject a phone to an attack. Currently, unless I am mistaken, the only iPhones that have been attacked by this vulnerability were at the Black Hat convention...
Jeff Carlson  An apple icon for a TidBITS Staffer 2009-08-01 16:03
That's a good point. I've retitled the article to be "Apple Fixes Serious iPhone SMS Vulnerability" instead of "Attack".

Thanks!
James S  2009-08-03 18:21
interesting. an iphone vulnerability is fixed blitzschnell quick and yet it takes months for them to fix a Java vulnerability in Mac OS X.