website statistics
Recently, reports have revealed that iPhone users are vulnerable to SMS spoofing attack. Apple has responded, asserting the security of iMessage.
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading...

Apple’s iPhone is considered as one of the most secure devices, given the fact that Apple’s iOS comes with fairly tight security measures. However, now and then, we caught a glimpse of a flaw or a loophole even in such security. Recently, there were reports about successful SMS spoofing attacks against iPhone. Now, Apple has responded to these reports.


SMS spoofing

Basically, SMS spoofing works like this. You receive a message from an individual and that individual can specify any number other than his own to receive your reply. So when you respond to such a message, your message essentially goes to some other number than the one which sent you the message.

The tech news were abuzz recently when it was revealed that even iPhone was vulnerable to such an attack. Now, Apple has chosen to respond to this news.

According to Apple, “Apple takes security very seriously. When using iMessage instead of SMS, addresses are verified which protects against these kinds of spoofing attacks. One of the limitations of SMS is that it allows messages to be sent with spoofed addresses to any phone, so we urge customers to be extremely careful if they’re directed to an unknown website or address over SMS.”

As it turns out, SMS spoofing attack can be launched against virtually any mobile platform and there is no effective way to thwart it. There are many services which offer the ability to appear anyone else when sending a text message. Naturally, this does pose a certain security risk to the user who receives such a text. But then, one should always be careful in texting and shouldn’t reveal any sensitive information.

Source: Engadget

[ttjad keyword=”hot”]


India Plans Biometric Identification For All Citizens. That’s 1.2 Billion!

Motorola Sets Press Event On September 5
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On August 20, 2012(3 years, 8 months ago.)

You May Also Like:

What Do You Think?

1 Response

  1. Flirty Ortiz Says:

    Apple’s iPhone is considered as one of the most secure devices, given
    the fact that Apple’s iOS comes with fairly tight security measures.
    However, now and then, we caught a glimpse of a flaw or a loophole even
    in such security.

    http://incentiveproperties.com/

    Posted on August 21st, 2012 at 5:22 PM

Leave a Reply




Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.


Recent Search

Recent Tutorials

Check out the quickest way to enable or disable the Google Chrome notifications for Desktop if you are finding it a bit challenging.
Learn how to find out Apple iPhone's IMEI and Serial number even if your phone is stolen or you don't have the device on your hand.
Now you can set custom ringtones to individual skype contacts on android. It's easy to setup. Take a look.
Now you can install Microsoft's Cortana on Android devices. It's pretty easy to install. Follow the steps below, check the screenshot.
Want to install Android lollipop 5.0.2 on pc? This post is for you. It's pretty easy to install and run. Just take a look.
With our partnership with Mode Media, we just got a jump start. Here is our first story of hand picked curated content on Android Tutorials.
Want to change theme on android ? We will show you how to change theme on android. It will makes your phone looks like new and smart.
You can record your screen on android very easily. No root Required. All you have to need a pc and USB cable. Let's find out.
A simple tutorial on how-to block a phone number on Android device, without an external app. Its pretty easy and straight-forward. Take a look.
Here we will show how to take Screenshot on your Apple Watch.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook