Skip to main content

Posts

Showing posts from July 19, 2008

Hackers crack iBoot, dual-boot 1.x iPhone firmware

Hackers have managed to penetrate to one of the deepest levels in the iPhone 3G's software, according to claims. The makers of the PwnageTool say that in working on v2.0 of their software, they have managed to crack "iBoot," the command line used to communicate with the 3G's equivalent of a BIOS. iBoot is said to be present because iTunes requires a lever for restoring a phone; normally, however, iBoot is said to be "heavily restricted," permitting only Apple code. The only access layer deeper than iBoot is said to be in ROM, and so any further anti-unlocking efforts could force hardware changes. The team meanwhile says it has achieved a means of dual-booting older iPhones that use the v1.1.x firmware. On a phone currently loaded with v1.1.1, for instance, people can allegedly create a separate v1.1.1 partition, and then upgrade the main one to v1.1.4. The technique requires downgrading to iTunes 7.5 however, and knowledge in accessing base drive commands.

WiFi Security–The Only Way is WPA

It’s far too easy to set up WiFi for your home or business; all you have to do is go to your local electronics superstore and pick up a wireless router, plug it in to your network, and connect to it. The default configuration of most consumer products–completely open with no security enabled–will allow you to connect without having to enter any configuration information into your wireless PC. That’s why in any given neighborhood you’ll see multiple unsecured wireless network connections available. Most public WiFi hotstpots are also unsecured, open connections. If you just surf the web and send an occasional email, you might be OK (besides the fact that anyone in range can connect to and use your Internet connection), but the moment you start using your PC for banking, making purchases, and paying bills online, that wireless connection absolutely must be secured. It must be done right, and there’s really only one right way to do it. Before I explain that, let me tell you what not to do

Wi-Fi Security: Some Advice from the FBI

You're at the airport waiting for your flight. With time to kill, you're thinking of connecting your laptop to the airport's Wi-Fi to check your office e-mail...do some personal banking...or shop for a gift for your spouse. But first, consider this: odds are there's a hacker nearby, with his own laptop, attempting to "eavesdrop" on your computer to obtain personal data that will provide access to your money or even to your company's sensitive information. Here's something else to consider: there are 68,000 Wi-Fi "hot spots" in the U.S. (see the graphic below for the top Wi-Fi countries), at airports, coffee shops, hotels, bookstores, schools, and other locations where hundreds or thousands of people pass through every day. While many of these hot spots have secure networks, some do not, according to Supervisory Special Agent Donna Peterson of our Cyber Division. And connecting to an unsecure network can leave you vulnerable to attacks from