	{"id":71,"date":"2007-12-12T10:09:01","date_gmt":"2007-12-12T08:09:01","guid":{"rendered":"http:\/\/blog.intego.com\/2007\/12\/12\/will-the-iphone-be-hackers-delight\/"},"modified":"2012-12-12T13:49:11","modified_gmt":"2012-12-12T21:49:11","slug":"will-the-iphone-be-hackers-delight","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/","title":{"rendered":"Will the iPhone be Hacker&#8217;s Delight?"},"content":{"rendered":"<p>There have been several security issues with the iPhone, in its short life, from <a href=\"https:\/\/www.intego.com\/mac-security-blog\/is-your-iphone-safe\/\">this weakness<\/a> which appeared shortly after its release, to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-a-trio-of-security-updates\/\">this<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-issues-iphone-update-with-security-fixes\/\">this<\/a>, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/security-update-for-iphone-and-ipod-touch\/\">this<\/a> security update for the device. In addition, there has been a lot of talk about how it could be attacked by hackers.<\/p>\n<p>In a <a href=\"http:\/\/press-releases.techwhack.com\/15093\/iphone-6\/\">vague press release<\/a> from a security analyst hoping to make a name for itself, suggestions are made that the &#8220;iPhone will become the victim of a serious attack in 2008.&#8221; This analyst suggests that &#8220;These assaults are likely to be in the form of drive by attacks \u2013 malware embedded into seemingly harmless information, images or other media that actually perform dangerous actions when rendered on the iPhone\u2019s Web browser.&#8221;<\/p>\n<p>Well, that&#8217;s like saying it will rain sometime next month, but we don&#8217;t know when or how much. However, one comment does make sense: &#8220;hackers will be enticed by the possibility of attacking Apple users and the opportunity to \u201cbe the first\u201d to hack a new platform.&#8221; The iPhone is high-profile, it&#8217;s always on, and it has Internet access, all factors that could lead to attacks. In addition, phone users generally don&#8217;t worry about security &#8211; they don&#8217;t have firewalls or antivirus software installed, and in the case of the iPhone, there are no possibilities to install this sort of software.<\/p>\n<p>Intego believes that there will be threats to the iPhone, and given the kinds of flaws that have affected Apple software recently (the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-variant-of-rsplug-trojan-horse\/\">RSPlug Trojan Horse<\/a> and the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/quicktime-streaming-flaw-threatens-mac-and-windows\/\">QuickTime streaming flaw<\/a>), it&#8217;s not clear which type of malware will be most effective, or most virulent. It is worth noting that there are ways of hijacking phones to make money &#8211; having them call expensive numbers that are not included in phone plans, for example; something that is harder to do on computers.<\/p>\n<p>Intego is monitoring security issues on the iPhone, and will provide information whenever any threats appear that affect this device.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There have been several security issues with the iPhone, in its short life, from this weakness which appeared shortly after its release, to this, this, and this security update for the device. In addition, there has been a lot of talk about how it could be attacked by hackers. In a vague press release from [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"There have been several security issues with the iPhone, in its short life, from this weakness which appeared shortly after its release, to this, this,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Will the iPhone be Hacker&#039;s Delight? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"There have been several security issues with the iPhone, in its short life, from this weakness which appeared shortly after its release, to this, this,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2007-12-12T08:09:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-12-12T21:49:11+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/\",\"name\":\"Will the iPhone be Hacker's Delight? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2007-12-12T08:09:01+00:00\",\"dateModified\":\"2012-12-12T21:49:11+00:00\",\"description\":\"There have been several security issues with the iPhone, in its short life, from this weakness which appeared shortly after its release, to this, this,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Will the iPhone be Hacker&#8217;s Delight?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Will the iPhone be Hacker&#8217;s Delight?\",\"datePublished\":\"2007-12-12T08:09:01+00:00\",\"dateModified\":\"2012-12-12T21:49:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/#webpage\"},\"wordCount\":329,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"There have been several security issues with the iPhone, in its short life, from this weakness which appeared shortly after its release, to this, this,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/","og_locale":"en_US","og_type":"article","og_title":"Will the iPhone be Hacker's Delight? - The Mac Security Blog","og_description":"There have been several security issues with the iPhone, in its short life, from this weakness which appeared shortly after its release, to this, this,","og_url":"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/","og_site_name":"The Mac Security Blog","article_published_time":"2007-12-12T08:09:01+00:00","article_modified_time":"2012-12-12T21:49:11+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/","name":"Will the iPhone be Hacker's Delight? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2007-12-12T08:09:01+00:00","dateModified":"2012-12-12T21:49:11+00:00","description":"There have been several security issues with the iPhone, in its short life, from this weakness which appeared shortly after its release, to this, this,","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Will the iPhone be Hacker&#8217;s Delight?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Will the iPhone be Hacker&#8217;s Delight?","datePublished":"2007-12-12T08:09:01+00:00","dateModified":"2012-12-12T21:49:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/will-the-iphone-be-hackers-delight\/#webpage"},"wordCount":329,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-19","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/71"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=71"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/71\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=71"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=71"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=71"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}