Home > Accounting Articles > The Situation Of Pwn2Own Hacking Contest: iPhone Was Breached In 20 Seconds

The Situation Of Pwn2Own Hacking Contest: iPhone Was Breached In 20 Seconds

Todays Date: December 15, 2018

According to foreign media reports, Pwn2Own hacking contest the network security conference CanSecWest held on Wednesday, two European hackers used only 20 seconds to successfully break the iPhone, and took the $ 15,000 prize money. Beijing time March 25th morning news, according to foreign media reports, Pwn2Own hacking contest the network security conference CanSecWest held on Wednesday, two European hackers used only 20 seconds to successfully break the iPhone, and took the $ 15,000 prize money.

The two hackers named Vincenzo ? Ai Aozuo (Vincenzo Iozzo) and Ralph ? Weinman (Ralf Weinmann). They used a method not disclosed on the iPhone’s Safari browser attacks, and thus control of the iPhone, followed by running a program that will send this message to the iPhone(iphone 4s cat case), a network server.

It is the 2008 Apple iPhone 2.0 operating system releases since the first time this phone was broken. Apple for the iPhone 2.0(wholesale iphone 4s cases) launch a series of high-end security measures, including the integration of the core in the device “sandbox”(sandbox), the technology can play in restricting the hacker attack. In addition, Apple also increased the cryptographic signature mechanism, which increases the difficulty of hacker attacks.

iPhone hackers successfully break the first Charlie? Miller (Charlie Miller) said: “iPhone 2.0 release, the device increase in the number of attacks more difficult. ” contest last year, iPhone(wholesale iphone 4 4s cases china) to not break.

Hacking contest at the current Pwn2Own, theNetherlandsindependent hackers Peter ? Peter Vreugdenhil also successfully used a number of loopholes in IE8 break the 64-bit Winows 7 operating system, so he received $10,000 inprize money and a department of Windows computers. Microsoft’s IE team, witnessed the whole attack process of Peter Vreugdenhil. Microsoft spokesman said the details are not yet available, but the attack until the Organizing Committee to collect information, they will respond as soon as possible.

The Miller successful invades the Apple MacBook with Safari browser flaw. He though the website specially designed attack the Safari , and obtain control of the MacBook.

http://financearticledirectory.com/wordpress/wp-content/plugins/sociofluid/images/digg_32.png http://financearticledirectory.com/wordpress/wp-content/plugins/sociofluid/images/reddit_32.png http://financearticledirectory.com/wordpress/wp-content/plugins/sociofluid/images/dzone_32.png http://financearticledirectory.com/wordpress/wp-content/plugins/sociofluid/images/stumbleupon_32.png http://financearticledirectory.com/wordpress/wp-content/plugins/sociofluid/images/delicious_32.png http://financearticledirectory.com/wordpress/wp-content/plugins/sociofluid/images/technorati_32.png http://financearticledirectory.com/wordpress/wp-content/plugins/sociofluid/images/google_32.png http://financearticledirectory.com/wordpress/wp-content/plugins/sociofluid/images/yahoobuzz_32.png http://financearticledirectory.com/wordpress/wp-content/plugins/sociofluid/images/mixx_32.png http://financearticledirectory.com/wordpress/wp-content/plugins/sociofluid/images/twitter_32.png http://financearticledirectory.com/wordpress/wp-content/plugins/sociofluid/images/jamespot_32.png
Comments are closed.