-
All replies
-
Helpful answers
-
Mar 17, 2012 3:38 PM in response to Soccerchik08by Meg St._Clair,★HelpfulSoccerchik08 wrote:
I have a non- jail broken iphone 4s and I was just wondering if some one could hack it or put a key logger on it. I also want to know if there is a way I can detect a key logger on my iphone, if there is one.
No, you can't put a keylogger on an non-jailbroken phone. I suppose, if someone had gotten a hold of your phone for some extended period of time, they could have jailbroken it and installed a keylogger. But I think you'd notice. Is there an app called "Cydia" anywhere on your phone?
Is something happening to make you think such a thing was installed? iOS is remarkably secure.
-
Mar 17, 2012 3:38 PM in response to Soccerchik08by Allan Sampson,Not with a non-hacked iPhone. With a hacked iPhone, all bets are off and someone would need physical access to your iPhone to install it.
-
Mar 17, 2012 3:38 PM in response to Soccerchik08by Julian Wright,★HelpfulNo. Key loggers cannot be installed on non-jail broken iPhones.
Legitimate apps do not have the required privileges to log keystrokes apart from within their own app.
-
Mar 17, 2012 3:47 PM in response to Meg St._Clairby Soccerchik08,Im just making sure all my stuff is secure now because I had a crazy ex put a key logger on my Dell computer and my emails and everything were hacked. So now Im just making sure that my iphone is secure. If I accessed my emails through my iphone could they have hacked the internet on the iphone and see all my websites and get my passwords? I also don't think that Cydia thing is on there, I searched my phone to make sure.
-
Mar 17, 2012 3:48 PM in response to Allan Sampsonby Soccerchik08,okay because my ex took my iphone and I got it back but I dont know if he put anything on it.
-
Mar 17, 2012 3:54 PM in response to Soccerchik08by Allan Sampson,To be sure, I suggest restoring your iPhone with iTunes as a new iPhone or not from the backup. If your ex hacked your iPhone with the cutsie term for this "jailbreak" along with installing a key logger, restoring your iPhone as a new iPhone will remove the hack and anything else that may have been installed on your iPhone.
-
-
Mar 19, 2012 12:46 PM in response to Soccerchik08by Pyrolite,Hey! I just had to say that you shouldn't lend out your phone to anybody you don't trust! lol It's like lending out your purse or wallet...
Safety First!
-
Mar 20, 2012 10:15 PM in response to Pyroliteby Soccerchik08,I didnt lend it out. It was taken when i was asleep and i even had a passcode on it that he guessed.
-
Sep 17, 2013 4:19 AM in response to Soccerchik08by MKSIMON,From some iphone keylogger website, I saw that they require a jailbroken iPhone/iPad for the keylogger to be installed. I'm sure if your iphone is not jailbroken then you won't have a keylogger
<Link Edited By Host>
-
Jun 29, 2012 11:32 AM in response to Soccerchik08by t.flannery,Apple uses Unix based operating systems with Java GUIs for their hardware. It is important for users to understand that the threats for mobile phones of any type are on the rise. Users store lots of personal information on mobile devises making the devise more valuable than a wallet. Mobile devises are small computers and are just as vulnerable as a laptop computer if not more because your mobile devise has many interfaces capable of attack.
The interfaces include service provider WAN (900MHz range), 802.11 WiFi access, Bluetooth, GPS, and infrared. These interfaces all have different avenues of attack. Apple takes great care in monitoring their app store but sometimes an attacker can upload malicious code to an app in the store to exploit mobile devices for attack. This method is popular on droid phones. Other attacks include Smurf attacks and packet sniffing. Some people know how to clone your device MAC address to use it in a hotspot that you paid for. Your devise gets kicked off the hotspot and the attackers devise now has free hotspot service.
Malicious code can make its way on to your phone through URLs, email attachments, infected apps, and other files (photos, audio, and video) just the same as a PC.
Is your locked iPhone vulnerable to a keylogger attack? I would have to argue, yes it is.
Tom Flannery
SGT/USAR
IT Instructor
BAS IT/NTC - University of Phoenix
-
Jun 29, 2012 11:47 AM in response to t.flanneryby varjak paw,Apple uses Unix based operating systems with Java GUIs for their hardware.
Sorry, Sargent Flannery, but that's incorrect and I'm not sure where you got that notion. None of Apple's operating systems use Java in any form for the GUI and have never done so. In fact, iOS won't even run Java at all.
As to keyloggers, a traditional keylogger application would be highly difficult if not impossible in iOS since Apple sandboxes apps from each other, so one app cannot read the keystrokes being entered into another app or the OS. That doesn't mean that apps cannot access information from components for which Apple provides an API such as the Contacts or Calendars, but a traditional keylogger, highly unlikely. Gettting malware onto an iOS device from an email, web site or synched file would also be difficult for the same reasons. Not impossible, but quite difficult.
There are of course other ways someone can capture personal information. But the most common way is to just trick someone into willingly providing it. The number of people who continue to fall for faked emails requesting bank and credit card information just astounds me.
Regards.
-
Jun 29, 2012 5:22 PM in response to varjak pawby t.flannery,I stand corrected the iPhone and apps are written in objective-C language which is similar to Java in the fact that it is object oriented and is true that the iPhone will not support java at this time. Thank you for the correction varjak paw.
Tom Flannery
-
Oct 15, 2013 11:48 PM in response to Soccerchik08by EmmaLS,Sorry to tell that all cell keylogging apps out there need the phone to be jailbreaken in order to install.
I know that ikeymonitor is the first keylogger for iPhone. However, you must jailbreak the target phone to install it.