The Latest in IT Security

XcodeGhost Another Crack In Apple’s Circle of Trust

22
Sep
2015

Apple-App-Store-800x500_c

On the heels of KeyRaider’s attack on jailbroken iPhones, attackers show they can hit non-broken devices too, sneaking 39 weaponized apps onto the official and around ‘s best efforts to lock down its developer environment.

Although Apple’s closed development environment has largely succeeded in keeping the App Store relatively free of malicious Mac and apps, Apple’s borders have begun to show some weak spots. , detailed by Palo Alto Networks, is the most recent example, and the most critical.

Read More

Leave a reply


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments