Security exploits affecting in iOS lets you control the device

American developer found that can bypass Apple's policing illegal orders to run appliances. The company responded by barring him

Someone can control the iPhone / iPod / iPad your (photo: publicists)
Mac developer and "hakr "American security breach found iOS operating system and publish it. Apple did not like it. Charlie Miller is planning to present at SysCan next week Btaioon method that can be exploited weakness Apple devices running on iOS - iPhone, iPod and iPad. Miller found that although the closed garden policy and Apple's application approval, an application can contact provides a desktop computer commands are rejected by Apple to run on the device.
It can be, for example, to steal user photos, read the list of his contacts and cause the phone to vibrate or make sounds. Miller even went further and filed a full application for approval on behalf of Instastock included this ability - with the action planned to demonstrate Btayeoon security conference, and made a video demonstrating the work."With this bug the customer can not be sure what he was downloading apps behave camps", Forbes magazine said Miller, who posted the news on the subject.
Miller managed to break through all the Apple product since 2007, and may present age is back broke the camel's back. Hours after discovery Miller received non-mail from Apple eliminates immediately the membership the company's developer program. This is despite not using the loophole abuse - but publish it to alert her.