tech

Apple iOS bug makes devices vulnerable to attack: experts

14 Comments

The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.

© (c) Copyright Thomson Reuters 2014.

©2024 GPlusMedia Inc.

14 Comments
Login to comment

Apple’s iOS has robust security features that make it extremely difficult for attackers to install malware on devices using traditional techniques for infecting Windows machines and Android mobile devices with malicious emails and Web links

“You can just say ‘Don’t install.’ As long as you do that, you will be protected from this vulnerability,” Richardson said.

How can you say both those sentences with a straight face, Apple is no more secure than anything else out there.

0 ( +2 / -2 )

How can you say both those sentences with a straight face, Apple is no more secure than anything else out there.

Yes it is.

-3 ( +1 / -4 )

@Strangerland, try selling that to anybody who heard of The Fappening on iCloud.

1 ( +2 / -1 )

@Strangerland, try selling that to anybody who heard of The Fappening on iCloud.

iCloud was not hacked. This was people using weak passwords, and having their passwords guessed. That doesn't make iCloud weak, that makes people who haven't listened to years of everyone recommending strong passwords. Human error, not platform error.

-1 ( +2 / -3 )

I believe a fix for this issue will be part of iOS 8.1.1, currently now in beta testing among Apple developers.

0 ( +1 / -1 )

@Strangerland: icloud was hacked, don't believe what spin apple said, apple didn't mitigate brute force logins (now fixed), photos were not encrypted, and 2step did not protect personal data including photos.

1 ( +2 / -1 )

Hacking means that someone gained unauthorized access to the system. That didn't happen. They got in with brute force attacks - meaning that they had a password, which in programming terms means their access was authorized to through the username/password combination. Not hacked.

0 ( +2 / -2 )

As in daily life, be wise. If I receive a pop-up message telling me to avoid such and such files, sites, I do that. Just incidentally, I had to use a Windows notebook today. I was amazed at how many malware warning I got. In the end it was very tiring, having to close so many warning windows I got in half an hour. In comparison to OSX it is very clunky and dirty, visually.

-1 ( +2 / -3 )

Strangerland: Brute force is hacking mate, it you want to live in an apple bubble go ahead.

1 ( +2 / -1 )

Brute force is hacking mate

No.

-3 ( +0 / -3 )

@Strangerland:

Question: Hacking 101: What Is 'Brute Force' Hacking? Answer: Hackers use three common methods to acquire people's computer passwords....

http://netforbeginners.about.com/od/b/f/What-Is-Brute-Force-Hacking.htm

0 ( +1 / -1 )

I had to use a Windows notebook today. I was amazed at how many malware warning I got. In the end it was very tiring, having to close so many warning windows I got in half an hour.

Those are not malware warning windows.

2 ( +2 / -0 )

That's like when people try to call DNoS attacks 'hacking'. It's not a hack, it's an attack.

-2 ( +0 / -2 )

Love how tech news like to sensationalize "bugs". Here's the truth about Masque Attack:

The attackers are using compromised enterprise certificates to deploy infected apps that masquerades as normal apps. Like the article said, these certificates are so that organizations can create their own apps for iOS and install them from outside the App Store. What the article fails to mention is that your iPhone has to be setup to accept the organization specific certificate in order for this "exploit" to work.

In order for you to get infected with these apps, you need to first be convinced in to downloading apps from outside the app store, click through multiple warnings about trusting the developer of the app, and then you can install it on your device. If you stick with the App Store (as 95% of iOS users do), this "exploit" will not affect you at all.

Apple can revoke the provision for any enterprise certificates they deem are being abusive, and that is exactly what they did.

So now Apple is in the unenviable position of protecting users from themselves.

-1 ( +0 / -1 )

Login to leave a comment

Facebook users

Use your Facebook account to login or register with JapanToday. By doing so, you will also receive an email inviting you to receive our news alerts.

Facebook Connect

Login with your JapanToday account

User registration

Articles, Offers & Useful Resources

A mix of what's trending on our other sites