Applications included in the category "Most Popular" and "Top Free" in the App Store.
According to recent reports about the security of the iPhone, it was revealed that most third-party applications available for iPhone-based devices is dangerous. They transmit the Unique Device Identifier (UDID) that is not encrypted can be used to steal personal information of users.
From a study of incoming applications in the category "Most Popular" and "Top Free" in the App Store, it is evident that 68 percent of software
UDID transmits the user's device. In addition, 18 percent of applications encrypt their communication so it can not know what data they share.
The findings were disclosed by Eric Smith, Network Administrator from Bucknell University who twice won the title in the arena of global security experts, DefCon.
Conclusions are drawn based on the 57 applications available for iPhone and note that personal information is sent in plain text form, the more potentially unsafe.
For information, UDID is given a unique identifier to any IOS-based devices including the iPod touch, iPhone and iPad. This code is used to prevent piracy of software in the App Store.
Smith compares, UDID on IOS-based device similar to the Processor Serial Number given Intel in their Pentium 3 processor. When it was Intel's decision to invite controversy and anger from the security group. Unfortunately, similar things do not happen to Apple.
Some applications are known to transmit UDID iPhone include software from Amazon, Chase Bank, Target, and Sams Club. CBS News even more severe applications. He sent UDID its user-assigned name for the iPhone, which generally includes the original name of the owner.
"Most of the iPhone application makers to collect and store data UDID from afar, and some manufacturers also have the ability to link users UDID with original identity," said Smith. "For example, Amazon's application communicates the user's real name is logged in the form of standard text, complete with UDID, allowing Amazon and tapper UDID network easily match with the phone owner's name," he said.
According to recent reports about the security of the iPhone, it was revealed that most third-party applications available for iPhone-based devices is dangerous. They transmit the Unique Device Identifier (UDID) that is not encrypted can be used to steal personal information of users.
From a study of incoming applications in the category "Most Popular" and "Top Free" in the App Store, it is evident that 68 percent of software
UDID transmits the user's device. In addition, 18 percent of applications encrypt their communication so it can not know what data they share.
The findings were disclosed by Eric Smith, Network Administrator from Bucknell University who twice won the title in the arena of global security experts, DefCon.
Conclusions are drawn based on the 57 applications available for iPhone and note that personal information is sent in plain text form, the more potentially unsafe.
For information, UDID is given a unique identifier to any IOS-based devices including the iPod touch, iPhone and iPad. This code is used to prevent piracy of software in the App Store.
Smith compares, UDID on IOS-based device similar to the Processor Serial Number given Intel in their Pentium 3 processor. When it was Intel's decision to invite controversy and anger from the security group. Unfortunately, similar things do not happen to Apple.
Some applications are known to transmit UDID iPhone include software from Amazon, Chase Bank, Target, and Sams Club. CBS News even more severe applications. He sent UDID its user-assigned name for the iPhone, which generally includes the original name of the owner.
"Most of the iPhone application makers to collect and store data UDID from afar, and some manufacturers also have the ability to link users UDID with original identity," said Smith. "For example, Amazon's application communicates the user's real name is logged in the form of standard text, complete with UDID, allowing Amazon and tapper UDID network easily match with the phone owner's name," he said.
Related Post :
info
Tuesday, February 08, 2011
//
Label:
info
//
0
komentar
//
0 komentar to "68 Percent of Harmful iPhone Applications"
Follow me please
Blog Archive
-
▼
2011
(130)
-
▼
February
(25)
- Samsung Infuse 4G
- Motorola Xoom Review
- Weakness iPhone 4
- weaknesses of apple ipad
- Smartphone, Android First Dual screen
- Windows XP Firewall - How Good Work?
- Progress Slot ESIA, ISA and PCI
- Google Changes the iPhone So Voice Translator
- Top 10 Motherboards for Gamers
- Motherboard Asus A8R-MVP
- Asus Eee PC 1015PEM
- SplashID Key Safe
- Iomega eGo Desktop Hard Drive, Mac Edition (2TB)
- Samsung and Google Prepare Nexus Two
- Logitec Launches A New 500GB Slim External HDD
- External Hard disk for Macbook Air
- 68 Percent of Harmful iPhone Applications
- 9 HP Most Strange, Expensive & Sophisticated World...
- Fuel Cell for Notebook Power 14 Hours
- Notebook Battery Recharging of Suitcases
- 13 Risk of Fatal Use of Mobile Phone Constantly
- Nokia Create Nanotechnology Concept
- Specs Western Digital My Book 3.0
- Hitachi 7K1000.C 1TB HDS721010CLA332
- Specs Western Digital My Book World Edition
-
▼
February
(25)
coins 4 me :)
drop me
google analystic
Labels
Recent Visitor
blogroll
- >aditsubang
- >Belajar Trik Blog
- >Benfany's Project
- >Cek Info
- >Cool Tutorials Collections
- >Download area,Business,information and computer
- >Get & Share Information
- >health care
- >Igun Suka- Suka
- >indoblogger
- >Info Tech
- >Info Terbaru
- >Joomla SEO Optimation
- >Kreatif anak jalanan
- >Mikrotik
- >Multi Blogging
- >rizkyzone
- >saffa inspiration
- >Share Gadget
- >supermilan
- >suryainformation
- >Tatap Muka
- >TheFree-File
- >tyrips
- RakitWeb
- Resa web
Post a Comment
● Your feedback will I Reply
● Follow this blog you will I follow your blog
● if you Put my link, I put your link on my blog
● if exchanging links, plug on the front page blog, do not be in the post / article
● No Porn, Advertising , verbal abuse, Bad Words
● if you are to follow this blog, or put my links, request for confirmation, so follow your links or installation faster
● Happy Commenting