Search

11 Year Old Hacks The Iphone

0 views

Business has a phrase called “Barriers to Entry” meaning that depending on skill and money, some companies are easier to start than others. It is easy to start a bookstore on Amazon, it is very hard to start up a company to take on Cisco.

Hacking has become a “easy access” or “Low barrier to entry” business, meaning all the kids who have a bent to see what they can get away with, are playing around with freely developed, open sourced, fully supported, hacking tools. These are tools that can be downloaded, installed, and used on just about any computing platform out there.

Earlier I talked about why Phishing Kits, and turn hacking into a child's game. Kids are smart, they will go where ever they want to go, and they will learn from anyone willing to teach them.

In January, a hacker unleashed an exploit that completely freezes up Apple's iPhone. Once installed, the app says only the word "shoes." When uninstalled, it removes files from the device's directory, effectively disabling Sendfile and other utilities. The exploit's creator is 11 years old. His dad has revoked his privileges. Source: Tool Physically Hacks Windows, Lets an attacker use Firewire to take over a 'locked' Windows machine” we not only let the good guys know, but we are taking information from the bad guys and using it to let the good guys know.

Kids read this stuff, they know this already, and odds are that there is going to be some teenager reading this and laughing, because they know exactly what is being said here. Kids have free access to tools and technology but little guidance outside of the support systems around the tools that they download.

It is not that the parents are absent, it is that the kids are doing things the parents have no hope of understanding. It is even more difficult to wrap your head around the FBI visiting your house because your precious snowflake is running a 50,000 computer botnet sending millions of spam messages a day.

We need to share our information, we need to monitor the hacking communities, and we need to be teaching proper information security ethics, skills, and knowledge. This is why I make the argument that sharing in this case is essential.

Suggest a Correction

Found an error or have a suggestion? Let us know and we'll review it.

Share this article

Comments (0)

Please sign in to leave a comment.

No comments yet. Be the first to comment!