Which phone is the most resistant to hacker attacks? iPhone 5S is beaten

Which phone is the most resistant to hacker attacks? iPhone 5S is beaten

Which smartphone is the most resistant to hacking? In a recent contest, the Windows Phone performed surprisingly well against hackers, as did the Google Nexus 5. But Apple 's iPhone 5S wasn't so lucky.

That's what happened earlier this week at HP's mobile Pwn2Own hacking contest in Tokyo, Japan, one of a series of such contests held annually by HP, which invites hackers to hack into specific devices or apps and then rewards them for the security vulnerabilities they find.

This competition revolves around popular smartphones.

After the hackers got their hands on the iPhone 5S, they hacked into the device through the Safari browser and obtained data on the phone. HP will not disclose what they did, how they controlled the phone, and how much control they had over the phone until Apple fixes the vulnerability. In any case, it is not a good thing for hackers to hack into other parts of the phone through the browser.

Two hackers also managed to break into a Samsung Galaxy S5 phone using NFC, a wireless payment technology, though HP would not say how much damage they were able to do. Perhaps the most impressive attack was on a Google Nexus 5 made by LG, forcing it to pair with another phone via Bluetooth, again using NFC, like something out of the TV show Person of Interest.

The Lumia 1520, which runs Microsoft 's Windows Phone operating system, was not completely impervious to hackers, but it was surprisingly resistant. Hackers were able to access the phone's browser cookie database, but they were unable to take full control of the phone. It was like a thief trying to climb into a house through the doghouse door but getting stuck halfway.

Another hacker was able to break into a Nexus 5 over WiFi, but like with the Windows Phone, he was unable to fully log out or do any more damage.

As smartphones become more popular, hackers and security companies are becoming more interested in such devices. For example, just this week, security company FireEye warned that vulnerabilities on iPhones and iPads could allow malware to install more malicious programs. However, Apple said no users have reported such attacks.

As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity.

<<:  When will wearable devices become truly popular?

>>:  The Big Future: Will cars really be able to drive themselves in the future?

Recommend

Let's prepare to pay tribute to the Xiaomi Empire

"Introduction": This is a long article....

Marketing: Apple says no one dares to be number one?

John Sculley, this seemingly unfamiliar name, act...

The most-liked answer on Zhihu: How are marketers made?

Today I saw some people who can analyze the suppl...

Product promotion from 0 to 1: How to acquire seed users?

Today we will introduce in detail how to write co...

I accidentally ate this fruit and my mouth swelled up like a sausage!

Review expert: Shi Jun, Ph.D. in botany, well-kno...

How to solve the problem of too many users connected to the Win server terminal?

The test succeeded under 2003 and failed under 20...

GMIC Voice | Experience the future world where everything is "mobile"

[[128462]] High energy warning ahead! The door to...

Summary of various sorting algorithms

Sorting algorithms are the most basic and commonl...

How is a brain with a good memory different from yours?

Autopsy results of the brains of "super-ager...

Analysis of the planning process of "Learn Together" online course activities

Figure 1-Case analysis mind map 1. User Path User...