📅 February 25, 2014

iOS Security Flaw Enables Malicious Apps to Secretly Log User Touch Inputs

FireEye mobile security researchers found approaches to bypass Apple’s app review process effectively and exploit non-jailbroken iOS 7 successfully.

ios-7-logo

Background monitoring mobile applications has become a hot topic on mobile devices. Existing reports show that such monitoring can be conducted on jailbroken iOS devices. FireEye mobile security researchers have discovered such vulnerability, and found approaches to bypass Apple’s app review process effectively and exploit non-jailbroken iOS 7 successfully. We have been collaborating with Apple on this issue.

Continue reading “iOS Security Flaw Enables Malicious Apps to Secretly Log User Touch Inputs”

📅 November 19, 2009

New WiFi Vulnerability Allows Hackers To Steal Your Email And Passwords

SMobile System has shed light on a new problem that concerns the safety of all smartphones including the iPhone.According to their statements, any iPhone, whether in its original state or jailbroken, can be attacked by bypassing the keys to the safety of WiFi hotspot.

SMobile System had brought to attention a new problem that concerns the safety of all smartphones including the iPhone.According to their statements, any iPhone, whether in its original state or jailbroken, can be attacked by bypassing the keys to the safety of WiFi hotspot. Through this type of attack, a hacker can steal your email and password without you even knowing that something is going on.

Continue reading “New WiFi Vulnerability Allows Hackers To Steal Your Email And Passwords”