Do you have adblock enabled?
If you can read this, either the style sheet didn't load or you have an older browser that doesn't support style sheets. Try clearing your browser cache and refreshing the page.

(The Daily Caller)   Hey, can I use your phone? Never mind, I don't really need to ask permission   (thedc.com) divider line 15
    More: Scary, listening device, Google Checkout, QR Code, spyware, mobile payments, application software, marketing strategy  
•       •       •

6126 clicks; posted to Geek » on 16 Mar 2012 at 12:55 PM (2 years ago)   |  Favorite    |   share:  Share on Twitter share via Email Share on Facebook   more»



15 Comments   (+0 »)
   
View Voting Results: Smartest and Funniest

Archived thread
 
2012-03-16 01:05:14 PM  
The most common password is "password1"?

Hah. Got that beat, mine is "password123"! Much more secure.
 
2012-03-16 01:06:19 PM  
8/10 of those require the user to access malicious content.

9/10 of those require the user to be a dumbass.
 
2012-03-16 01:31:16 PM  

Britney Spear's Speculum: 8/10 of those require the user to access malicious content.

9/10 of those require the user to be a dumbass.


Exactly. It's just the same social engineering stuff that's been around for decades already.
 
2012-03-16 02:09:40 PM  
Huck Chaser: 9/10 of those require the user to be a dumbass.

Which one doesn't? Because I'm counting 10/10 here.
 
2012-03-16 03:02:13 PM  
A recent stunt by Crowdstrike revealed a new vulnerability in Blackberry, iOS and Android systems. Users are lured to click on a malicious link sent to them via text message, which installs malware on a user's phone and allows hackers to eavesdrop on conversations and monitor a user's location.


Wouldn't that require a jailbroken iPhone?

/prefers a phone that makes phone calls only
//Not really a Luddite
 
2012-03-16 03:14:10 PM  

PirateKing: The most common password is "password1"?

Hah. Got that beat, mine is "password123"! Much more secure.


Meh, amateur. I use a capital "P"
 
2012-03-16 03:30:09 PM  
Things happen to phones which have happened to other digital devices for years? Guess what! If you put an advanced computer in your pocket and use it to store/access information people will find uses for, and means of retrieving, the information being stored/accessed.
 
2012-03-16 04:08:59 PM  
1. User error/stupidity
2. User error/stupidity
3. User error/stupidity
4. User error/stupidity
5. User error/stupidity
6. User error/stupidity
7. User error/stupidity
8. User error/stupidity
9. User error/stupidity
10. User error/stupidity
 
2012-03-16 05:08:08 PM  

downstairs: 1. User error/stupidity
2. User error/stupidity
3. User error/stupidity
4. User error/stupidity
5. User error/stupidity
6. User error/stupidity
7. User error/stupidity
8. User error/stupidity
9. User error/stupidity
10. User error/stupidity


^THIS
 
2012-03-16 05:09:23 PM  

AndreMA: A recent stunt by Crowdstrike revealed a new vulnerability in Blackberry, iOS and Android systems. Users are lured to click on a malicious link sent to them via text message, which installs malware on a user's phone and allows hackers to eavesdrop on conversations and monitor a user's location.

Wouldn't that require a jailbroken iPhone?

/prefers a phone that makes phone calls only
//Not really a Luddite


What? No, an iPhone runs iOS whether it's jailbroken or not
 
2012-03-16 06:53:28 PM  

NateAsbestos: AndreMA: A recent stunt by Crowdstrike revealed a new vulnerability in Blackberry, iOS and Android systems. Users are lured to click on a malicious link sent to them via text message, which installs malware on a user's phone and allows hackers to eavesdrop on conversations and monitor a user's location.

Wouldn't that require a jailbroken iPhone?

/prefers a phone that makes phone calls only
//Not really a Luddite

What? No, an iPhone runs iOS whether it's jailbroken or not


I obviously meant "to install the malware" -- unless it's hosted at Apple's store, which so many people complain about ("walled garden" and "gatekeeper" are often used).
 
2012-03-16 10:58:22 PM  
AndreMA: I obviously meant "to install the malware" -- unless it's hosted at Apple's store, which so many people complain about ("walled garden" and "gatekeeper" are often used).

Then how do you install the root kit in the first place :D

/a lot of rooting exploits holes in the system. In fact, I recall a story about a rooting tool that rooted the system, and then closed the hole behind itself so that malware couldn't get in using the same method.
 
2012-03-16 11:43:33 PM  

lordargent: Huck Chaser: 9/10 of those require the user to be a dumbass.

Which one doesn't? Because I'm counting 10/10 here.


I'm excluding the wifi one.

Which, in certain circles, would elicit 10/10 dumbassery
 
2012-03-17 04:29:13 AM  
I especially love how the paper reporting this is "The Daily Caller".
 
2012-03-17 07:09:54 PM  

AndreMA: NateAsbestos: AndreMA: A recent stunt by Crowdstrike revealed a new vulnerability in Blackberry, iOS and Android systems. Users are lured to click on a malicious link sent to them via text message, which installs malware on a user's phone and allows hackers to eavesdrop on conversations and monitor a user's location.

Wouldn't that require a jailbroken iPhone?

/prefers a phone that makes phone calls only
//Not really a Luddite

What? No, an iPhone runs iOS whether it's jailbroken or not

I obviously meant "to install the malware" -- unless it's hosted at Apple's store, which so many people complain about ("walled garden" and "gatekeeper" are often used).


Oh, my apologies. As for the answer to your question, I don't know, I don't have an iPhone. But every day I spend using my Samsung Fascinate makes me wish I did. fark this phone
 
Displayed 15 of 15 comments

View Voting Results: Smartest and Funniest


This thread is archived, and closed to new comments.

Continue Farking
Submit a Link »
On Twitter





In Other Media


  1. Links are submitted by members of the Fark community.

  2. When community members submit a link, they also write a custom headline for the story.

  3. Other Farkers comment on the links. This is the number of comments. Click here to read them.

  4. Click here to submit a link.

Report