{"id":12947,"date":"2010-03-25T03:20:00","date_gmt":"2010-03-25T03:20:00","guid":{"rendered":"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/iphones-sms-database-can-be-hijacked-in-20-seconds-exploits\/"},"modified":"2010-03-25T03:20:00","modified_gmt":"2010-03-25T03:20:00","slug":"iphones-sms-database-can-be-hijacked-in-20-seconds-exploits","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/futurist\/iphones-sms-database-can-be-hijacked-in-20-seconds-exploits.php","title":{"rendered":"iPhone&#8217;s SMS Database Can Be Hijacked in 20 Seconds [Exploits]"},"content":{"rendered":"<div>\t\t\t\t\t\t\t\t\t\t<!--  div style=\"background-color: #B3B3B3; width: 160px; padding: 1px;\"&gt;<a title=\"Click here to read iPhone's SMS Database Can Be Hijacked in 20 Seconds\" href=\"http:\/\/gizmodo.com\/tag\/exploits\/\"><span>#<\/span><span>exploits<\/span><\/a>&lt;\/div --><div><a title=\"Click here to read iPhone's SMS Database Can Be Hijacked in 20 Seconds\" href=\"http:\/\/gizmodo.com\/5501521\/iphones-sms-database-can-be-hijacked-in-20-seconds\"><br>\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" style=\"padding-left:10px; padding-right: 10px;\" height=\"120\" width=\"160\" alt=\"Click here to read iPhone's SMS Database Can Be Hijacked in 20 Seconds\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/1d9b0_160x120_iphone.jpg\"><br>\t\t\t\t\t\t\t\t\t\t\t<\/a><\/div><\/div><p>\t\t\t\tAs part of the Pwn2Own 2010 hacking contest, Vincenzo Iozzo and Ralf Philipp Weinmann created an exploit which allows them to hijack fully-patched iPhones' SMS databases&mdash;right down to deleted messages&mdash;simply by luring users to a \"rigged\" website.\t\t\t\t<a href=\"http:\/\/gizmodo.com\/5501521\/iphones-sms-database-can-be-hijacked-in-20-seconds\" title=\"Click here to read more about iPhone's SMS Database Can Be Hijacked in 20 Seconds [Exploits]\">More&nbsp;&raquo;<\/a><\/p><p><a href=\"http:\/\/ads.pheedo.com\/click.phdo?s=0f0aa88435a4356632826ca6b47ec119&amp;p=1\"><img decoding=\"async\" alt=\"\" style=\"padding-left:10px; padding-right: 10px;\" border=\"0\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/0fe81_img.phdo?s=0f0aa88435a4356632826ca6b47ec119&amp;p=1\"><\/a><br><!-- foo --><\/p><div><a href=\"http:\/\/feeds.gawker.com\/~ff\/gizmodo\/full?a=7ydjw_IQXD0:0Fb22lIizdo:H0mrP-F8Qgo\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/0fe81_full?d=H0mrP-F8Qgo\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a> <a href=\"http:\/\/feeds.gawker.com\/~ff\/gizmodo\/full?a=7ydjw_IQXD0:0Fb22lIizdo:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/0fe81_full?d=yIl2AUoC8zA\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a> <a href=\"http:\/\/feeds.gawker.com\/~ff\/gizmodo\/full?a=7ydjw_IQXD0:0Fb22lIizdo:D7DqB2pKExk\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/0fe81_full?i=7ydjw_IQXD0:0Fb22lIizdo:D7DqB2pKExk\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a> <a href=\"http:\/\/feeds.gawker.com\/~ff\/gizmodo\/full?a=7ydjw_IQXD0:0Fb22lIizdo:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/0fe81_full?i=7ydjw_IQXD0:0Fb22lIizdo:V_sGLiPBpWU\" border=\"0\" style=\"padding-left:10px; padding-right: 10px;\"><\/a><\/div><p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/euvolution.com\/futurist-transhuman-news-blog\/wp-content\/plugins\/wp-o-matic\/cache\/0fe81_7ydjw_IQXD0\" height=\"1\" width=\"1\" style=\"padding-left:10px; padding-right: 10px;\"><\/p>","protected":false},"excerpt":{"rendered":"<p>As part of the Pwn2Own 2010 hacking contest, Vincenzo Iozzo and Ralf Philipp Weinmann created an exploit which allows them to hijack fully-patched iPhones' SMS databases&mdash;right down to deleted messages&mdash;simply by luring users to a \"rigged\" website. More&nbsp;&raquo;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[10],"tags":[],"class_list":["post-12947","post","type-post","status-publish","format-standard","hentry","category-futurist"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/12947"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=12947"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/12947\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=12947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=12947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=12947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}