Researchers at FireEye say they’ve discovered a vulnerability, nicknamed “Masque Attack,” that lets malicious websites replace legitimate apps with malware. iOS app can be installed using enterprise/ad-hoc provisioning and they could replace another genuine app installed through the App Store, as long as both apps used the same bundle identifier. This new app may display an eye catching title that lures the user to install it, but the app can replace another genuine app after installation. All apps can be replaced except iOS preinstalled apps. FireEye says it notified Apple about the exploit in July, but the technique still works the iOS 8.1.1 beta.
However, practically the threat to your iOS device is relatively low. you’ll likely be fine so long as you stick to downloading from the App Store.
Table of Contents Introduction to IT Managed Service Providers Why Outsource IT Management? Cost-Effective Solutions…
Key Takeaways: The importance of selecting the correct thresholds for different areas in your home…
Key Takeaways: The variety of railing gate designs can significantly enhance the aesthetic appeal of…
For many, commuting is an unavoidable part of daily life. But when that commute extends…
When you're on the road, you want to feel safe, comfortable, and like you have…
Key Takeaways: Understanding the significance of indoor air quality. Identifying common pollutants in your home.…