If you use iMessage for a while on an iPhone you notice that it mixes actual SMS text messages and purely IP-based iMessage instant messages in the same message window. The vulnerability allowed the sender of an SMS text message to an iMessage user to spoof the name of the source. This might seem relatively minor, but it could be a major element of a larger, more sophisticated social engineering attack.
Apple actually recommended that users use iMessage instant messages instead of SMS as a workaround, as if that's a solution for people who don't have iOS devices. But why should we trust iMessage? Just because Apple asserts that iMessage is a secure protocol? We can't trust that unless the protocol is documented and challenged.
This approach is old news for Apple. In his keynote at the 2010 WWDC, Steve Jobs introduced FaceTime (that segment begins at 1:29:22). At 1:36:44, he talks about the standards used in FaceTime and declares, "We're going to take it all the way. We're going to the standards bodies starting tomorrow, and we're going to make FaceTime an open industry standard." Apple never followed through on this, nor has it been seriously challenged on it.
FaceTime is an infamously-closed system, unavailable to other networks for interconnection. To open it up Apple would have to document at least some interfaces or conform to standards. That's not the Apple way.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.