This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Poll consenus shows that people believe the Apple iPhone worm was a positive thing as searches for source code increase

Share this article:

Three quarters of voters in a poll about the iPhone worm believe that creator Ashley Towns had 'done users a favour'.

A poll by Sophos found that of 721 respondents, 75 per cent agreed that Towns had ‘done iPhone users a favour. This was an acceptable way to raise awareness of poor security'.

Meanwhile fifteen per cent hoped he was investigated by the police as ‘when he released that worm he broke the law' while ten per cent believed that he had ‘acted recklessly by releasing the worm – the end does not justify the means'.

A new poll being run on the Sophos website asked whether visitors believed that the iPhone will be exposed to more virus attacks in future? At the time of writing 1,400 people had voted; with 70 per cent saying yes, 26 per cent also agreeing but believing that only jailbroken iPhones will be at risk and users who don't tinker with their iPhone will be immune. Only four per cent had said no.

Graham Cluley, senior technology consultant at Sophos, said: “The 21-year-old Australian student who wrote the iPhone worm has acted utterly irresponsibly - even if he now regretted (which he doesn't) releasing a worm into the wild, there is nothing he can do to stop it continuing to try and infect jailbroken iPhones.

“What's worst of all is that the code for the worm is now available for anyone to download. The genie is let out of the bottle - and anyone could write a more dangerous version of the worm which could have a much more dangerous payload."

Cluley later claimed that many people are looking for the worm's source code. He revealed that the top keywords searched for by people ending up on his blog include: ikee; ikee source code; ikee source; iPhone worm; ikee worm and ikee iPhone.

“That worries me. After all, who has an interest in the ikee worm's source code? None other than hackers who might want to create more variants of the worm, perhaps with more malicious intentions than displaying a picture of a pop star from the 1980s,” said Cluley.

However not everyone agrees with Sophos' findings about the seriousness of the worm. Jamie de Guerre, CTO of Cloudmark, claimed that this specific attack is not that interesting as it only compromises phones that users have hacked in a way that breaks the terms of Apple's end user licensing agreement.

“It does not capitalise on a software vulnerability, rather just on user negligence to change the default password of the remote access software made available after jailbreaking their phone,” said de Guerre.

“The fact that there have not been more serious vulnerabilities compromising the iPhone is a testament to Apple and the mobile operators that provide service.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

New Androids will encrypt your data just like iPhones

New Androids will encrypt your data just like ...

Google has promised that the next generation of Android phones will automatically encrypt data - preventing police and other agencies snooping on their users.

Russian cyber attack exploits Scottish independence vote

Russian cyber attack exploits Scottish independence vote

UK oil firms warned to guard against new campaign as Russian malware exploits Scottish independende vote.

Card and banking fraud back on the rise again

Card and banking fraud back on the rise ...

Banking and card fraud back on the rise again says the FFA UK as crime increasingly moves online.