Main menu (IT)

Masque Attack on iPhones: How to Avoid

November 13, 2014

Image of an iPhone against a black background.

Photo Courtesy of Reuters

"In a blog posting, Milpitas, California-based FireEye described how a corrupted iOS app could be installed on a non-jailbroken iOS device through the misuse of enterprise or developer certificates. Such corrupted apps could spy on the user and, possibly, take over the device.

However, this has been known for quite some time. It's based on a fundamental flaw in the iOS security model, one that contributed to the success of the WireLurker malware discovered last week, which was the first "in the wild" malware to ever affect non-jailbroken iOS devices."

Read more at Fox News