Which phone is the most resistant to hacker attacks? iPhone 5S is beaten

Which phone is the most resistant to hacker attacks? iPhone 5S is beaten

Which smartphone is the most resistant to hacking? In a recent contest, the Windows Phone performed surprisingly well against hackers, as did the Google Nexus 5. But Apple 's iPhone 5S wasn't so lucky.

That's what happened earlier this week at HP's mobile Pwn2Own hacking contest in Tokyo, Japan, one of a series of such contests held annually by HP, which invites hackers to hack into specific devices or apps and then rewards them for the security vulnerabilities they find.

This competition revolves around popular smartphones.

After the hackers got their hands on the iPhone 5S, they hacked into the device through the Safari browser and obtained data on the phone. HP will not disclose what they did, how they controlled the phone, and how much control they had over the phone until Apple fixes the vulnerability. In any case, it is not a good thing for hackers to hack into other parts of the phone through the browser.

Two hackers also managed to break into a Samsung Galaxy S5 phone using NFC, a wireless payment technology, though HP would not say how much damage they were able to do. Perhaps the most impressive attack was on a Google Nexus 5 made by LG, forcing it to pair with another phone via Bluetooth, again using NFC, like something out of the TV show Person of Interest.

The Lumia 1520, which runs Microsoft 's Windows Phone operating system, was not completely impervious to hackers, but it was surprisingly resistant. Hackers were able to access the phone's browser cookie database, but they were unable to take full control of the phone. It was like a thief trying to climb into a house through the doghouse door but getting stuck halfway.

Another hacker was able to break into a Nexus 5 over WiFi, but like with the Windows Phone, he was unable to fully log out or do any more damage.

As smartphones become more popular, hackers and security companies are becoming more interested in such devices. For example, just this week, security company FireEye warned that vulnerabilities on iPhones and iPads could allow malware to install more malicious programs. However, Apple said no users have reported such attacks.

As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity.

<<:  When will wearable devices become truly popular?

>>:  The Big Future: Will cars really be able to drive themselves in the future?

Recommend

Case analysis of information flow advertising in the clothing franchise industry

This is an era of excellence, and with the help o...

4 key points and misunderstandings of refined operations in 2020

2020 is the year when online consumer demand has ...

Analysis of Pinduoduo’s business model, products and usage

Pinduoduo is a platform e-commerce company with a...

The ancestor of shuttlecock kicking is actually football?

Window of Intangible Cultural Heritage Shuttlecoc...

Brand Promotion Guide on Station B!

Bilibili, a video content community that started ...

The 6 underlying logics of brands behind Douyin’s full-case launch!

In recent years, new brands have risen rapidly, n...

How do new media professionals follow hot topics? Here are my 4 thoughts

In the past few months, I have been struggling wi...

How to publish multiple articles on WeChat subscription account?

How to publish multiple articles on WeChat subscr...