Successful exploits of the flaw would enable attackers to take control of targeted iPhones, iPads or iPod Touch devices, security researchers have found.
The flaw is the way the Apple iOS 4 deals with PDF files and can be exploited if a user can be tricked into visiting a website containing a malicious PDF.
Paul Vlissidis, technical director at IT assurance firm NCC Group, said this type of vulnerability is consistent with what has been seen with new technologies.
"There is always a delay from when they are introduced until new vulnerabilities emerge," he said.
Users also need to take responsibility for their own security settings and respond to security alerts from suppliers, he said.
"As smartphones become increasingly popular in the market place, more vulnerabilities such as this will come to light, as hacking capabilities become progressively more sophisticated," Vlissidis said.
Published by Computer Weekly
Uploaded by Niall Mulrine PC Clean Navenny, Ballybofey, Co. Donegal
Great User Interface design, I appreciate the Desginer
ReplyDeleteREgards,
Seshu Gopal Vundavalli
http://rhinocadjewelrydesignservices.blogspot.in