Security researchers found a way to take over Apple's new beautiful gadget, the iPhone, when it connects to a wifi connection or when a user surfs to a page with a malicious script, according to this story in the New York Times.
Next up, some black hat hacker will create an iPhone botnet and use it to send spam with the sig line: Sent from someone else's iPhone. But I bet the spam will be beautiful.
Details on the hole found by Independent Security Evaluators.
Photo: Bradley P. Johnson

