We put you in situation. Charlie Miller is a well known Apple product security researcher. For this, this good man has had to pay himself the license as a developer to be able to investigate the black spots of the operating system that the Cupertino mobile has installed, although Apple itself invited the researcher to join them.
The last discovery was made just a few days ago. And to prove it, he recorded a video in which it could be seen as a simple, harmless application installed on an iPhone 4, bypassing all the security measures of the Apple application store. But, what was achieved when installing this application? Very simple, to be able to access the equipment in question from any computer remotely or remotely.
Charlie Miller demonstrated in video that once the application was installed on the terminal, be it iPhone, iPad or iPod Touch, the equipment was exposed, and the hacker better known as a hacker could access all the personal information that the user saves on your terminal: be it photos, contact lists, emails, etc...
The researcher, who had previously worked for the National Security Agency, was going to show in Taiwan during an event on computer security, what was the way in which Apple mobile devices were exposed. However, the Cupertino people realized what Miller was trying to do.
And unfortunately for him, the researcher saw how his license to belong to the Apple developer program was canceled - it is still unknown if for an indefinite period of time - and the malicious application was withdrawn from the Apple store. All this history has been followed by the Forbes portal, which has tried to contact Apple and for the moment they have not commented on the matter.