‘Terminator 2’ UHD Blu-ray comes with a life-size robot arm

Terminator 2: Judgment Day is one of the best action movies of all time. It's also consistently been a great piece of reference material for home theater geeks who like showing off just what their fancy audio and video gear is capable of. Well, this...

Chromecast Ultra review: Better video quality comes at a cost

Google's first Chromecast was an ugly little stick that nonetheless served an important purpose: At $35, it was about the cheapest way to make a plain old TV "smart," letting people get Netflix, Hulu, YouTube and movies from Google Play on their tele...

iPhone reportedly vulnerable to text message spoofing flaw

iPhone reportedly vulnerable to text message spoofing flaw

If you're an iPhone owner, you may want to use good judgment before responding to any out-of-the-blue text messages in the near future. French jailbreak developer and security researcher pod2g finds that every iPhone firmware revision, even iOS 6 beta 4, is susceptible to a flaw that theoretically lets a ne'er-do-well spoof the reply address of outbound SMS messages. As Apple is using the reply-to address of a message's User Data Header to identify the origin rather than the raw source, receiving iPhone owners risk being fooled by a phishing attack (or just a dishonest acquaintance) that poses as a contact or a company. A proof of concept messaging tool is coming to the iPhone soon, but pod2g is pushing for an official solution before the next iOS version is out the door. We've asked Apple for commentary and will get back if there's an update. In the meantime, we wouldn't panic -- if the trickery hasn't been a significant issue since 2007, there isn't likely to be a sudden outbreak today.

Filed under:

iPhone reportedly vulnerable to text message spoofing flaw originally appeared on Engadget on Fri, 17 Aug 2012 12:53:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourcepod2g  | Email this | Comments