"Personal Assistant» Siri can be used in such a way that it could not provide the company Apple - for secure communication from the attacker to the malware installed on your phone, and vice versa. Conceptual application called iStegSiri introducing extraneous information in audio files, which generates software Siri.During MiTM-attack, on a position between the user device and servers Siri, an attacker intercepts the messages and decodes them. Thus, it can receive confidential information from the phone is completely transparent to the user, network firewall and antivirus programs. At the very least, identify steganography in audio files can not none of the existing tools.


Application developed by Luca Caviglione of the National Research Council of Italy and Wojciech Mazurczyk, associate professor of Warsaw University of Technology (Poland).
The authors explain that uses the library iStegSiri Libactivator or acts through standard APIs Apple.
The method works only on the iPhone / iPad, which have undergone the procedure of jailbreaking.
Source: xakep.ru
TRANSLATION
No comments:
Post a Comment