KEY POINTS:
A computer security firm in the United States has said it has exposed a hole in the technology driving Apple's popular new iPhone that could allow hackers to take "complete control" of the device, stealing information ranging from emails and text messages to telephone numbers.'
An analyst at Independent Security Evaluators has informed Apple of the apparent flaw, which it says could be remedied with a fairly straightforward "software patch".
In the meantime, however, it seems the data of proud owners of the new device could be at risk.
"We're looking into the report submitted by ISE and always welcome feedback on how to improve our security," a spokeswoman for Apple told the New York Times.
"Apple takes security very seriously and has a great track record of addressing potential vulnerabilities."
Experts had already been warning that because the iPhone is more like a portable computer than a traditional mobile phone, it was bound to share the vulnerabilities of regular computers, including invasion by worms and viruses.
This is the first credible claim of problems relating to hacking, however.
According to Charles Miller of ISE, intruders can penetrate the iPhone's security barrier by inducing its user to enter a website that could then infect it with a malicious code.
That done, the hacker could download all and any files on the phone and even make calls from it, running up huge bills.
"Once you did manage to find a hole, you were in complete control," he said.
Alternatively, users of iPhones could run into trouble if they inadvertently tap into a rogue WiFi connection, which could likewise be used to compromise its integrity.
Mr Miller, who used to work for the National Security Agency in the US, advised buyers of the device only to connect to WiFi points they are familiar with and similarly to avoid unfamiliar websites while browsing the internet.
Some of the details ofthe company's successin breaking down the iPhone's fortifications were to be shown on a website called Exploiting iPhone.
The site will not be offering a step-by-step guide to hacking into the device, however.
Propelled by enormous media hype, the iPhone managed sales of roughly 500,000 units in just two days after its June launch, by recent estimates - higher than even Apple was expecting.
Assuming it can be solved quickly, this report from ISE is unlikely to slow its advance in the cell phone market.
The device has posed a particular challenge for hackers around the world, whose main interest thus far has been to twiddle its software to allow it to tap into other phone networks.
At present, the iPhone is a closed system, specifically engineered only to allow the use of the AT&T cellular network in the United States.
- INDEPENDENT