• Home
  • News
  • Fortune 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia

Smartphones 1, Hackers 0

By
Philip Elmer-DeWitt
Philip Elmer-DeWitt
Down Arrow Button Icon
By
Philip Elmer-DeWitt
Philip Elmer-DeWitt
Down Arrow Button Icon
March 21, 2009, 12:28 PM ET

There were several $10,000 prizes at stake — as well as some free mobile phones — but at the end of the three-day Pwn2Own smartphone hacking contest at the big CamSecWest conference in Vancouver, British Columbia, which closed on Friday, none of the devices had been cracked.

The contest, sponsored by 3Com’s (COMS) TippingPoint computer security division, pitted some of the world’s sharpest hackers and computer security experts against five smartphones: an Apple (AAPL) iPhone, a Research in Motion (RIMM) BlackBerry and phones running on Google’s (GOOG) Android, Microsoft’s (MSFT) Windows Mobile and Nokia’s (NOK) Symbian operating systems.

Although the rules were relaxed each day to make hacking easier, the phones managed to withstand the few attempts that were made to “pwn” them — Internet-gamer slang meaning to conquer or gain ownership.

The Web browsers were not so lucky. In a separate contest, now in its third year, the security barriers of Apple’s Safari, Mozilla’s Firefox and Microsoft’s Internet Explorer were breached in the first day — Safari’s in less than 10 seconds using an exploit prepared before the contest. The latest version of Microsoft’s Web browser — IE8 — fell even before the browser’s official release. Only Google’s Chrome survived day one. See here.

It’s not clear why the smartphones did so well and the browsers so badly. It may be that the devices are too new to have been studied closely. “There’s a lot we don’t know yet about them,” Charlie Miller, the man who cracked Safari so quickly, told CNet’s Elinor Mills (link). In fact, there were very few attempts made. Tipping Point’s twitter feed mentioned only two: one against a BlackBerry and another against a Nokia phone running Symbian.

But there’s no question that smartphones are vulnerable to attack. SearchSecurity.com reports that during one conference presentation a team from Core Security Technologies, a Boston-based penetration testing company, demonstrated how to crack into the iPhone, Google Android and Windows Mobile devices using something called a simulated stack overflow vulnerability.

According to Alfredo Ortega, one of the Core researchers, the iPhone had the most security features, making it the most difficult to crack. Windows Mobile, he said, was the easiest to defeat. (link)



When it’s not running contests, TippingPoint operates its ZeroDay Initiative, in which it pays computer security specialists — also known as “white hat hackers” — a bounty for previously undiscovered vulnerabilities in return for a promise not to exploit them.

TippingPoint, in turn, notifies the vendor and simultaneously develops a patch that it offers to its security clients. Once the vendor has developed its own patch, TippingPoint and the vendor coordinate public disclosure. The researcher can either be given credit for the discovery or, if he or she prefers, remain anonymous.

See also: White hat hackers target the iPhone

Below the fold: the rules of the contest as posted on the CamSecWest website here.

Phones (and associated test platform)

  • Blackberry(TBA)
  • Android(Dev G1)
  • iPhone(locked 2.0)
  • Nokia/Symbian(N95-1)
  • Windows Mobile (HTC Touch)

Day 1 (Raw functionality out of the box, users configured for service) post phone, post email

  • SMS
  • MMS
  • Email (arrival only)
  • wifi on if default
  • bluetooth on if default
  • Radio stack

Day 2

  • All of Day 1
  • Email/SMS/MMS (reading only – no secondary actions)
  • wifi on
  • bluetooth on (not accept pairing by default. Paired with a headset. pairing process not visible)

Day 3

  • All of Day 1 and 2
  • one level of user interaction with default applications
  • bluetooth on (not accept pairing by default. Paired with a headset/other devices upon request. pairing process visible)

What is owned? Must demonstrate…

  • loss of information (user data)
  • incur financial cost
About the Author
By Philip Elmer-DeWitt
See full bioRight Arrow Button Icon

Latest in

Personal Financemortgages
Current mortgage rates report for Dec. 8, 2025: Rates hold steady with Fed meeting on horizon
By Glen Luke FlanaganDecember 8, 2025
41 minutes ago
Personal FinanceReal Estate
Current refi mortgage rates report for Dec. 8, 2025
By Glen Luke FlanaganDecember 8, 2025
41 minutes ago
CryptoBinance
Binance has been proudly nomadic for years. A new announcement suggests it’s finally chosen a headquarters
By Ben WeissDecember 7, 2025
5 hours ago
Big TechStreaming
Trump warns Netflix-Warner deal may pose antitrust ‘problem’
By Hadriana Lowenkron, Se Young Lee and BloombergDecember 7, 2025
8 hours ago
Big TechOpenAI
OpenAI goes from stock market savior to burden as AI risks mount
By Ryan Vlastelica and BloombergDecember 7, 2025
9 hours ago
InvestingStock
What bubble? Asset managers in risk-on mode stick with stocks
By Julien Ponthus, Natalia Kniazhevich, Abhishek Vishnoi and BloombergDecember 7, 2025
9 hours ago

Most Popular

placeholder alt text
Real Estate
The 'Great Housing Reset' is coming: Income growth will outpace home-price growth in 2026, Redfin forecasts
By Nino PaoliDecember 6, 2025
2 days ago
placeholder alt text
AI
Nvidia CEO says data centers take about 3 years to construct in the U.S., while in China 'they can build a hospital in a weekend'
By Nino PaoliDecember 6, 2025
2 days ago
placeholder alt text
Economy
The most likely solution to the U.S. debt crisis is severe austerity triggered by a fiscal calamity, former White House economic adviser says
By Jason MaDecember 6, 2025
1 day ago
placeholder alt text
Economy
JPMorgan CEO Jamie Dimon says Europe has a 'real problem’
By Katherine Chiglinsky and BloombergDecember 6, 2025
1 day ago
placeholder alt text
Big Tech
Mark Zuckerberg rebranded Facebook for the metaverse. Four years and $70 billion in losses later, he’s moving on
By Eva RoytburgDecember 5, 2025
3 days ago
placeholder alt text
Politics
Supreme Court to reconsider a 90-year-old unanimous ruling that limits presidential power on removing heads of independent agencies
By Mark Sherman and The Associated PressDecember 7, 2025
17 hours ago
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.