Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Turn Word 2008 Notes into a To-Do List

In the Word 2008 Notebook Layout View (View > Notebook Layout View), bring up the Formatting Palette (View > Formatting Palette). Look for the Note Flags section in the Formatting Palette. Select the flag type, type in your reminder or even assign yourself an Entourage 2008 task. Check off your to-dos once the task is complete.

Visit Mactopia - Word 2008

Submitted by
Microsoft MacBU

 
 

Apple Fixes Serious iPhone SMS Vulnerability

Send Article to a Friend

At this year's Black Hat security conference, one of the largest conferences on Internet and computer security, researchers demonstrated the potential for SMS-based attacks on the iPhone that could disable the device or extract sensitive information from it. Although Apple reportedly was informed of the vulnerability 6 weeks ago, the company released iPhone OS 3.0.1 on 31-Jul-09, the day after the demo. The update is available now, via iTunes.

Researchers Charlie Miller and Collin Mulliner, of Independent Security Evaluators, issued a denial-of-service attack on CNET correspondent Elinor Mills's iPhone by sending her a specially crafted SMS message, or more accurately, hundreds of specially crafted SMS control messages, only the first of which was seen.

While the researchers only showed how attackers might use the method to disable a user's phone, Miller said it was also possible to utilize this exploit to steal data, make calls, and send text messages. In fact, once having gained access to a user's phone, an attacker could then spread the attack further by sending SMS messages to the numbers listed in the address book.

While a reboot would restore functionality to a disabled phone and is about all a user could do, it takes only seconds for an attacker to swipe sensitive data and gain access to the address book. Worse, although we haven't seen commentary about this, since SMS uses a store-and-forward mechanism, messages sent while a phone was turned off would theoretically be delivered as soon as it was turned back on.

What's especially dangerous about this attack is that it requires no action on the part of the user. Typically, iPhone attacks involve tricking the user into visiting a malicious Web site or opening a specially crafted file - thus giving potential victims at least some agency in their defense - but this one only requires that the attacker has the user's phone number.

The exploit was made possible by a memory corruption bug in the way the iPhone handles SMS messages, and affects all versions of the iPhone OS before 3.0.1. If you haven't yet updated to iPhone OS 3.0, now is your chance to go all the way to 3.0.1 and eliminate your vulnerability to this SMS vulnerability.

SMS-based attacks aren't unique to the iPhone, with Miller and Mulliner also demonstrating this particular bug on an Android-based phone. Google patched the hole in Android last week, within a few days of being notified.

 

Updated! PDFpen for iPad 1.7: Designed for iOS 7, faster, and
better-looking. Edit your PDFs anywhere. Sign contracts, make
changes, fill forms, and more. All while you’re on the move.
Syncs via iCloud and Dropbox. <http://smle.us/tbpdfpen-ipad>
 

Comments about Apple Fixes Serious iPhone SMS Vulnerability

Jack Hayes  2009-08-01 15:35
Your title is misleading. Apple didn't fix an SMS attack, they fixed an SMS vulnerability that could subject a phone to an attack. Currently, unless I am mistaken, the only iPhones that have been attacked by this vulnerability were at the Black Hat convention...
Jeff Carlson  An apple icon for a TidBITS Staffer 2009-08-01 16:03
That's a good point. I've retitled the article to be "Apple Fixes Serious iPhone SMS Vulnerability" instead of "Attack".

Thanks!
James S  2009-08-03 18:21
interesting. an iphone vulnerability is fixed blitzschnell quick and yet it takes months for them to fix a Java vulnerability in Mac OS X.