suzanne3382

Q: Can the iPhone5 be hacked remotely by a hacker?

I work for a technology company and one of our employees shared an incident about her iPhone5 being hacked remotely. The hacker gained access to her device overnight while her phone was unlocked. The hacker watched her baby monitor video feed from the baby monitoring app  (including taking pictures and video from the device), posted about the baby to her FB account, browsed on Safari, including some searches of French books on amazon and Scott Trading sites. When I spoke with the mobile device team, they were not familiar with any iOS security gaps that would allow a hacker to remotely gain control of an iPhone, however, the activities on her device suggest that this is possible.

 

I found some articles from 2009 regarding a SMS virus that allowed hackers to gain remote access to a device, however, our mobile device team is certain that this gap would be closed by now.

 

Is anyone familiar with an existing security gap on the iPhone5? What would you recommend would be the next action for her? She is intending to delete her icloud account, change all her passwords and wipe her device.

iPhone 5, iOS 6.1.1

Posted on Mar 19, 2013 1:23 PM

Close

Q: Can the iPhone5 be hacked remotely by a hacker?

  • All replies
  • Helpful answers

first Previous Page 5 of 12 last Next
  • by pbunny3,

    pbunny3 pbunny3 Feb 21, 2015 6:54 PM in response to Lexiepex
    Level 1 (0 points)
    Feb 21, 2015 6:54 PM in response to Lexiepex

    I am astonished by the support peoples responses to iphones being hacked. Are you paid to call people idiots and state iphones cannot be hacked?

    power fluctuations caused the browser to open and randomly typed searches of peoples names or existing websites? While sleeping i took pictures and video from baby monitor app? Posted to FB with my butt?

    Really?

    This is how Apple deals with issues it thinks could give a product a bad name?

  • by pbunny3,

    pbunny3 pbunny3 Feb 21, 2015 7:28 PM in response to pbunny3
    Level 1 (0 points)
    Feb 21, 2015 7:28 PM in response to pbunny3

    What about these programs.

    BTScanner

    Bluesnarfer

    Bluediving

    BTCrack

    BLooover

    None of these would help someone out to mess things up gain access to an Iphone now would they?

    And of course Iphone's security is like fort Knox because Apple wrote all the code. Including the bluetooth protocols?. Right?

    Does someone want to tell me I'm wrong and asleep and its just my butt typing????

    People used to generally believe that Apple products were immune to virus. They are not. No one was writing virus's for Apple products because there was so few of them out there. Spend all that effort in writing a virus and not get your 15 minutes of fame because it only effected a few people? Times are changing. There is a lot more Apple products out there. The little deviants are working away. The Titanic was unsinkable. How'd that work out?

  • by Meg St._Clair,

    Meg St._Clair Meg St._Clair Feb 21, 2015 7:50 PM in response to pbunny3
    Level 9 (58,841 points)
    iPhone
    Feb 21, 2015 7:50 PM in response to pbunny3

    pbunny3 wrote:

     

    I am astonished by the support peoples responses to iphones being hacked. Are you paid to call people idiots and state iphones cannot be hacked?

    power fluctuations caused the browser to open and randomly typed searches of peoples names or existing websites? While sleeping i took pictures and video from baby monitor app? Posted to FB with my butt?

    Really?

    This is how Apple deals with issues it thinks could give a product a bad name?

    There are very few Apple support people on these forums and none in this thread so far. I don't believe anyone has been called an idiot (though that could certainly change at any moment).

     

    Yes, power fluctuations caused by a damaged or defective charger or cable can cause exactly those symptoms. So can a defective digitizer. Given the way iOS software is written, both of these things are more likely explanations than remote hacking. This thread is also not a discussion of all Apple productions. It is a discussion of specifically iOS devices, a system that is quite different than the Mac OS. The likelihood of their being a virus that will affect a non-jailbroken iOS device being so low is not because Apple wrote the software but because of how they wrote it. Either you are unaware of sandboxing or don't understand it.  To date, there have been no viruses that affect an un-jailbroken iOS device.

  • by pbunny3,

    pbunny3 pbunny3 Feb 22, 2015 7:06 AM in response to Meg St._Clair
    Level 1 (0 points)
    Feb 22, 2015 7:06 AM in response to Meg St._Clair

    "I don't believe anyone has been called an idiot (though that could certainly change at any moment)."

    It appears you just called me an idiot.

     

    And you did not address anything from my posts. Please do tell how its possible for IOS to post and write to a webpage all on its own. And then you can please explain how a power flux from a charger can cause the IOS software to bypass ALL security protocols and dump any and all personal information to random websites??

    Your words to answer what caused the "symptoms"  of the phone to post to a website while the person was asleep with the phone on the bedside table.

    "power fluctuations caused by a damaged or defective charger or cable can cause exactly those symptoms"

    I would think this breaking new would have hit all the New stations and papers. Congrats on figuring this all out.

     

    Please explain it in detail how its possible. Because "Either you are unaware of sandboxing or don't understand it."

     

    Assuming the butt, which was asleep at the time stamp of photos and videos being taken did not do the deed. Instead it was the evil power flux which then posted these images from the phone to a website and wrote a blurb about them. I understand sandboxing, do you? How does it relate to this persons experience with their phone? How was the camera accessed. A folder containing media. The media itself. At least two APPs, the baby monitoring app and the browser or Facebook app. The browser or Facebook app are not capable of writing anything on their own. Which points to the operating system itself or someone doing it remotely. If it's not remotely being operated that's one very big sandbox layer you got there. don't ya think? So nice of iOS to place such a big sandbox for all these apps to play together.........not your standard sandboxing. Which kinda points to remote access which would be labeled a virus.

     

    "The likelihood of their being a virus that will affect a non-jailbroken iOS device being so low is not because Apple wrote the software but because of how they wrote it. Either you are unaware of sandboxing or don't understand it.  To date, there have been no viruses that affect an un-jailbroken iOS device."


    According to whom? No virus of an un-jailbroken iOS device. People like yourself? Who are give information which is burnt at the stake as heresy against iOS? It was a power fluctuation. Your butt did it. or the best one yet "it didnt happen"


    I'm really looking forward to learning how the iOS is able post information from my phone to the web on it's own. With written captions no less.

     

     

    Here are two quotes which should be useful to anyone approaching a troubling mystery. You should have no problem approaching the cases before you with a blank mind. The second quote requires you to accept the truth and not fanatically stand behind the almighty iOS.

     

    "Let me run over the principal steps. We approached the case, you remember, with an absolutely blank mind, which is always an advantage. We had formed no theories. We were simply there to observe and to draw inferences from our observations."

    Sherlock Holmes

     

     

     

    "when you have eliminated the impossible, whatever remains, however improbable, must be the truth?"

    Sherlock Holmes



  • by Lexiepex,

    Lexiepex Lexiepex Feb 22, 2015 7:11 AM in response to pbunny3
    Level 6 (10,477 points)
    Mac OS X
    Feb 22, 2015 7:11 AM in response to pbunny3

    "I don't believe anyone has been called an idiot (though that could certainly change at any moment)."

    It appears you just called me an idiot.

    This is just a matter of subjective interpretation, invited probably by your negative attitude to the advice you got. In my opinion Meg's advice was not pedantic nor negative. So I think you are overreacting. Best is to bypass such feelings by keeping concentrated on solutions instead of thinking conspiracy companies.

    Lex

  • by Csound1,

    Csound1 Csound1 Feb 22, 2015 7:15 AM in response to pbunny3
    Level 9 (50,397 points)
    Desktops
    Feb 22, 2015 7:15 AM in response to pbunny3

    The only person here using the word idiot is you.

  • by Marbilste,

    Marbilste Marbilste Feb 22, 2015 7:18 AM in response to Meg St._Clair
    Level 1 (0 points)
    Feb 22, 2015 7:18 AM in response to Meg St._Clair

    I purchased new charger from Apple...still experiencing same issue

  • by Marbilste,

    Marbilste Marbilste Feb 22, 2015 7:22 AM in response to Meg St._Clair
    Level 1 (0 points)
    Feb 22, 2015 7:22 AM in response to Meg St._Clair

    I purchased brand new charger from Apple...still experiencing same issue

  • by pbunny3,

    pbunny3 pbunny3 Feb 22, 2015 7:25 AM in response to Csound1
    Level 1 (0 points)
    Feb 22, 2015 7:25 AM in response to Csound1

    Meg can call me anything she likes. It doesn't harm me in the least. But subjective interpretation? Really. Why bother addressing it. Meg new what she was doing with the original wording in her response. It quite clear. And it doesn't matter. 

     

    Anyone want to explain the bad cable theory in detail please? Really looking forward to it. And the whole thing with the operating system posting pictures and writing to websites. REALLY looking forward to the security protocols section.

  • by Lexiepex,

    Lexiepex Lexiepex Feb 22, 2015 7:30 AM in response to pbunny3
    Level 6 (10,477 points)
    Mac OS X
    Feb 22, 2015 7:30 AM in response to pbunny3

    pbunny3, I have just reread the whole thread: you have nothing presented in terms of finding a solution for the question posted. Just here to spit gall on the world around you. Even you as Sherlock Holmes reader should be aware that this forum here is about users  (not Apple) trying to help users with issues. It is time to stop with hacking this thread.

  • by Csound1,

    Csound1 Csound1 Feb 22, 2015 7:33 AM in response to pbunny3
    Level 9 (50,397 points)
    Desktops
    Feb 22, 2015 7:33 AM in response to pbunny3

    It is not possible to explain anything to one who (wrongly) thinks they already know everything.

     

    good day to you.

  • by Meg St._Clair,

    Meg St._Clair Meg St._Clair Feb 22, 2015 9:28 AM in response to pbunny3
    Level 9 (58,841 points)
    iPhone
    Feb 22, 2015 9:28 AM in response to pbunny3

    pbunny3 wrote:

     

    Meg can call me anything she likes. It doesn't harm me in the least. But subjective interpretation? Really. Why bother addressing it. Meg new what she was doing with the original wording in her response. It quite clear. And it doesn't matter.

    I did not call you anything. It is entirely your interpretation that I did. I just recognize that when people with an attitude such as your show up, it's not long before they either start with the ad hominem attacks on others or imply that such were made against them. The need to of some people to project their own negative interpretations on others is predictable. And, low and behold, I was correct.

     

    I cannot prove there are no viruses that affect non-jailbroken iPhones as proving a negative is a logical impossibility. I challenge you to provide verifiable citations of the existence of such viruses on iOS devices that have not been jailbroken. So far, all you have done is disparage the posts of others. If you can present such evidence, I'm sure we would all be very interested in knowing about it.

  • by Lexiepex,

    Lexiepex Lexiepex Feb 22, 2015 9:51 AM in response to Meg St._Clair
    Level 6 (10,477 points)
    Mac OS X
    Feb 22, 2015 9:51 AM in response to Meg St._Clair

    Better stop it Meg, he came here not with an issue but hacked somebody's thread to display his anger with the rest of the world. Not to help solve it.

    Lex

  • by Meg St._Clair,

    Meg St._Clair Meg St._Clair Feb 22, 2015 10:29 AM in response to Lexiepex
    Level 9 (58,841 points)
    iPhone
    Feb 22, 2015 10:29 AM in response to Lexiepex

    LexSchellings wrote:

     

    Better stop it Meg, he came here not with an issue but hacked somebody's thread to display his anger with the rest of the world. Not to help solve it.

    Lex

    Yes, yes, you're right. I just hope that people who stumble upon this thread from, say a Google search, will note that no evidence of any viruses have been presented. Fear mongering just really galls me.

  • by pbunny3,

    pbunny3 pbunny3 Feb 22, 2015 11:32 AM in response to Meg St._Clair
    Level 1 (0 points)
    Feb 22, 2015 11:32 AM in response to Meg St._Clair

    Sorry for not reponding quickly. I was shopping with my wife. Sail hss a 40% off sale.

     

    i have a constru tion company and us my iphone extensively with regaurd to my business. I found this thread while doing a search on iphone security. I hold alot of company and client info on the cloud and in my phone. Security is very important. This is an Apple owned and run site. People with concerns turn to these forums for help and information.

    I have concerns over security. Ive reponded to someones concern and the answer give them. So far everyone has responded with a personal attack on me and who i am. And not answering my question.

first Previous Page 5 of 12 last Next