{"id":1701,"date":"2011-02-10T08:44:15","date_gmt":"2011-02-10T16:44:15","guid":{"rendered":"http:\/\/blog.cosaint.net\/?p=1701"},"modified":"2024-04-24T12:01:14","modified_gmt":"2024-04-24T06:31:14","slug":"stealing-passwords-from-a-locked-iphone-more-smart-phone-insecurity","status":"publish","type":"post","link":"https:\/\/www.empowerelearning.com\/blog\/stealing-passwords-from-a-locked-iphone-more-smart-phone-insecurity\/","title":{"rendered":"Stealing Passwords from a Locked iPhone &#8211; More Smart Phone Insecurity"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-full wp-image-1702\" title=\"iphone\" src=\"https:\/\/www.empowerbpo.com\/blog\/wp-content\/uploads\/2011\/02\/iphone.jpg\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2011\/02\/iphone.jpg 150w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2011\/02\/iphone-100x100.jpg 100w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Another reminder &#8211; as if we needed it &#8211; that <a href=\"https:\/\/www.empowerelearning.com\/courses\/best-password-practices\/\">smart phones and mobile devices<\/a> are increasingly the targets for hackers.<\/p>\n<p>This time, it&#8217;s an iPhone issue. German researchers claim to be able to steal passwords stored on a locked Apple iPhone in just six minutes &#8230; without cracking the iPhone&#8217;s passcode.<\/p>\n<p>Read more in this post on the Sophos blog: <a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/02\/10\/video-how-to-steal-passwords-locked-iphone\/\" target=\"_blank\" rel=\"noopener nofollow\">VIDEO: How to steal passwords from a locked iPhone<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another reminder &#8211; as if we needed it &#8211; that smart phones and mobile devices are increasingly the targets for hackers. This time, it&#8217;s an iPhone issue. German researchers claim to be able to steal passwords stored on a locked Apple iPhone in just six minutes &#8230; without cracking the iPhone&#8217;s passcode. Read more in [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-1701","post","type-post","status-publish","format-standard","hentry","category-infosec"],"_links":{"self":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/1701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/comments?post=1701"}],"version-history":[{"count":0,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/1701\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media?parent=1701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/categories?post=1701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/tags?post=1701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}