Which smartphone is the most resistant to hacking? In a recent contest, the Windows Phone performed surprisingly well against hackers, as did the Google Nexus 5. But Apple 's iPhone 5S wasn't so lucky. That's what happened earlier this week at HP's mobile Pwn2Own hacking contest in Tokyo, Japan, one of a series of such contests held annually by HP, which invites hackers to hack into specific devices or apps and then rewards them for the security vulnerabilities they find. This competition revolves around popular smartphones. After the hackers got their hands on the iPhone 5S, they hacked into the device through the Safari browser and obtained data on the phone. HP will not disclose what they did, how they controlled the phone, and how much control they had over the phone until Apple fixes the vulnerability. In any case, it is not a good thing for hackers to hack into other parts of the phone through the browser. Two hackers also managed to break into a Samsung Galaxy S5 phone using NFC, a wireless payment technology, though HP would not say how much damage they were able to do. Perhaps the most impressive attack was on a Google Nexus 5 made by LG, forcing it to pair with another phone via Bluetooth, again using NFC, like something out of the TV show Person of Interest. The Lumia 1520, which runs Microsoft 's Windows Phone operating system, was not completely impervious to hackers, but it was surprisingly resistant. Hackers were able to access the phone's browser cookie database, but they were unable to take full control of the phone. It was like a thief trying to climb into a house through the doghouse door but getting stuck halfway. Another hacker was able to break into a Nexus 5 over WiFi, but like with the Windows Phone, he was unable to fully log out or do any more damage. As smartphones become more popular, hackers and security companies are becoming more interested in such devices. For example, just this week, security company FireEye warned that vulnerabilities on iPhones and iPads could allow malware to install more malicious programs. However, Apple said no users have reported such attacks. As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity. |
<<: When will wearable devices become truly popular?
>>: The Big Future: Will cars really be able to drive themselves in the future?
It's time to eat insects again. Oh no, it’s t...
Regarding the industry rumor that "China Mob...
In the field of operations , tags are usually a t...
Audit expert: Shi Jun Doctor of Botany, well-know...
Traditionally, restaurants use menus to place ord...
In the advertising industry, there has always bee...
The year 2016, which just passed, was the first y...
Private domain traffic is a good thing for some p...
According to foreign media reports on August 5, t...
Introduction: As the weather gets warmer, the wed...
The boss is going crazy because there is no promo...
Hello everyone, today I will mainly share two top...
This work is original to "Science Populariza...
The "imprint effect" in psychology show...
Last Friday, SquareTrade, a third-party smartphon...