Technology

Mobile Pwn2Own: Nexus 4, S4 and iPhone Hacked

December 4, 2013 | By Editor 

The main objective of the Mobile Pwn2own contest is to exploit every type of vulnerability found in mobile phones as well as the mobile operating systems. It attracts a huge number of hackers from around the globe, giving companies an opportunity to explore their bugs and vulnerabilities. The best among them will not only be rewarded for their discovery, but many corporates choose to hire talented hackers from this contest, so that they don’t go illegal against the developers. Finding the right talent and getting a chance to know one’s own shortcomings helps pwn2own to go strong for so many years.

 This time, it’s no different and they managed to hack all major mobile devices including the iPhone, Samsung Galaxy S4 and the Google Nexus 4. Companies usually consider this as feedback and fix them at the earliest. Encryption done by ssl certificates were also broken in the past, but usually high profile sophisticated systems can never be broken, which makes them the standard choice for website owners.

Mobile Antivirus

During this year’s event, hackers managed to win several thousands of dollars and the Mobile pwn2own contest was held in a grand manner in Tokyo. The event lasted for two whole days during which experts discussed on various topics. They focused on new bugs, SSL Certificates based encryption solutions for mobiles, fixing vulnerabilities and also applications that might help improve overall user experience.

One of the chief methods that hackers used to gain access to mobile phones is by enticing users to visit malware infested websites on their device. Once visited, trojan or bugs will automatically be injected into the device. The attack varies based on the methods used. If it was compromised using a web page or SMS determines the level of success a hacker can achieve in controlling individual devices.

Nexus 4 was hacked using a vulnerability and the entire hacking process was delivered to go Google so that they could fix it at the earliest. More exploits related to SSL Certificates and also on Safari on iPhone 5 was revealed during the second day of the event. Third party remote execution allowed them to retrieve photos stored on the device. Some apps on Samsung Galaxy S4 was exploited by using multiple bugs found in the applications. Experts suggest that users should be agile and not click on links which promise impossible things. Same goes for email messages as well. Things that plagued desktop are now slowly moving towards the mobile platform.

ssl certificate

<< Why SSL Certificates Are Inevitable For Merchants?Apple can read iMessages beyond Encryption >>

Posted in Technology

Be Sociable, Share!

Leave a Comment


 


* fields are mandatory