Tag : iOS
  • No events
AEC v1.0.4

Cyber Security Info

Mobile apps may eavesdrop by using gyroscope

August 21, 2014

Researchers from Stanford University and Israeli company Rafael have proven that the gyroscope in smartphones may be used to eav... read more

IOS malware has stolen revenue from 22 million ads

August 14, 2014

Researcher Axelle Apvrille has published a read more

Hidden services in iOS may be used to exfiltrate data

July 23, 2014

Security researcher Jonathan Zdziarski hasread more

Facebook SDK vulnerability reveals user’s access token

July 7, 2014

MetaIntell has read more

Apple users blackmailed to have their devices unblocked

May 28, 2014

A number of users of Apple devices (iPhones, iPads, MacBooks) have reported that their devices were in "stolen" mode initiated by the Find my iPhone service. The message sent to their devices required them to pay 100 USD/EUR ... read more

Apple does not encrypt e-mail attachments in iOS

May 4, 2014

German expert Andreas Kurz has discovered that e-mail attachments are not encrypted in iOS 7. That is ... read more

Apple updates

April 24, 2014

Apple has issued security issues foe variety of it's products. The most important are patches for SSL protocol. Although Apple originally claimed that it's products are not affected by the Heartbleed bug, it now recognized the vulnerabili... read more

Vulnerability of random number generator in iOS 7

March 18, 2014

One of the vulnerabilities of previous version of iOS operating system Apple wanted to patch in iOS 7 was the random number generator used for encryption of the kernel services. However, researcher Tarjei Mandt from Azimuth Security has p... read more

Ability to install keylogger on non-jailbroken iOS device

February 26, 2014

FireEye has demonstrated ability of a malware installed on Apple iOS device to monitor... read more

Critical SSL vulnerability in Apple operating systems

February 24, 2014

Apple has released an update for iOS mobile operating system repairing a vulnerability in SSL implementation. Th... read more