12 GOING INTO REVERSE
John Mitchell has spotted that attacks on mobile devices are coming from a different angle.
A few months ago I read an article from a technology journalist regarding the hijacking of his Apple iCloud account and the subsequent deletion of all the data on his iPhone and other devices. Note, it was the hypervisor that had been hijacked and not the device, which provided the back door into his phone.
This leads to all sorts of concerns over the security of mobile devices. Many of us will have loaded software to enable us find our phone if it is lost or stolen, and to remotely delete the data held on it at our instruction, but in this case the attack came from above rather than below, which raises the game somewhat.
Instead ...