Which phone is the most resistant to hacker attacks? iPhone 5S is beaten

Which phone is the most resistant to hacker attacks? iPhone 5S is beaten

Which smartphone is the most resistant to hacking? In a recent contest, the Windows Phone performed surprisingly well against hackers, as did the Google Nexus 5. But Apple 's iPhone 5S wasn't so lucky.

That's what happened earlier this week at HP's mobile Pwn2Own hacking contest in Tokyo, Japan, one of a series of such contests held annually by HP, which invites hackers to hack into specific devices or apps and then rewards them for the security vulnerabilities they find.

This competition revolves around popular smartphones.

After the hackers got their hands on the iPhone 5S, they hacked into the device through the Safari browser and obtained data on the phone. HP will not disclose what they did, how they controlled the phone, and how much control they had over the phone until Apple fixes the vulnerability. In any case, it is not a good thing for hackers to hack into other parts of the phone through the browser.

Two hackers also managed to break into a Samsung Galaxy S5 phone using NFC, a wireless payment technology, though HP would not say how much damage they were able to do. Perhaps the most impressive attack was on a Google Nexus 5 made by LG, forcing it to pair with another phone via Bluetooth, again using NFC, like something out of the TV show Person of Interest.

The Lumia 1520, which runs Microsoft 's Windows Phone operating system, was not completely impervious to hackers, but it was surprisingly resistant. Hackers were able to access the phone's browser cookie database, but they were unable to take full control of the phone. It was like a thief trying to climb into a house through the doghouse door but getting stuck halfway.

Another hacker was able to break into a Nexus 5 over WiFi, but like with the Windows Phone, he was unable to fully log out or do any more damage.

As smartphones become more popular, hackers and security companies are becoming more interested in such devices. For example, just this week, security company FireEye warned that vulnerabilities on iPhones and iPads could allow malware to install more malicious programs. However, Apple said no users have reported such attacks.

As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity.

<<:  When will wearable devices become truly popular?

>>:  The Big Future: Will cars really be able to drive themselves in the future?

Recommend

With wage arrears and layoffs, is Zhidou going to be in trouble?

According to online reports, more than 80 employe...

Is Toutiao’s promotion effective? How much does it usually cost?

Toutiao promotion is a combination of information...

Case analysis: The operating model of "Lian Coffee"!

The user social growth system of "Growth Cof...

Analysis of the refined operation routines of VVIP users on video websites

When it comes to the VIP dispute, people initiall...

A complete guide to taking screenshots of App Store apps!

This article is enough for setting screenshots for...

Analysis of AARRR (user growth) model: How to achieve user growth?

This article starts from the experience and expla...

Top 10 H5 ads that dominated the screen in 2017, how many have you played?

2017 is almost over. Do you still remember the H5...

Please check out the 618 marketing strategy for the wedding photography industry!

This article shares with you Tencent Advertising’...