Apple, Mac, iOS4, iPad, iPhone and (in)security...
10.0K views | +0 today
Follow
Apple, Mac, iOS4, iPad, iPhone and (in)security...
Everything related to the (in)security of Apple products
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

iOS 9.3 to fix serious iMessages encryption flaw | #Update asap!!!

iOS 9.3 to fix serious iMessages encryption flaw | #Update asap!!! | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

For some time, Apple has forcefully pushed a message to consumers that it takes privacy seriously.
Here, for instance, is what Apple’s website says about its approach to privacy when it comes to iMessages:
Your iMessages and FaceTime calls are your business, not ours. Your communications are protected by end-to-end encryption across all your devices when you use iMessage and FaceTime...

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's insight:

For some time, Apple has forcefully pushed a message to consumers that it takes privacy seriously.
Here, for instance, is what Apple’s website says about its approach to privacy when it comes to iMessages:
Your iMessages and FaceTime calls are your business, not ours. Your communications are protected by end-to-end encryption across all your devices when you use iMessage and FaceTime...

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

AceDeceiver: Erster Trojaner für iOS entdeckt | #Apple #CyberSecurity #CyberCrime #NobodyIsPerfect 

AceDeceiver: Erster Trojaner für iOS entdeckt | #Apple #CyberSecurity #CyberCrime #NobodyIsPerfect  | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Der womöglich erste Trojaner für iOS, die nicht von Jailbreaks geschwächte iPhones und iPads befallen können, lautet auf den Namen AceDeceiver. Die Sicherheitsspezialisten von Palo Alto Networks haben heute einen ausführlichen Blogbeitrag veröffentlicht, in dem sie die Funktionsweise erklären. Derzeit besteht zwar keine konkrete Gefahr, da Apple bereits vor drei Wochen von Palo Alto informiert wurde und die von AceDeceiver in den App Store geschmuggelten Apps aus dem Angebot entfernt hat.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=AceDeceiver

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

10 Years of Mac Malware: How OS X Threats Have Evolved [Infographic] | CyberSecurity | Apple 

10 Years of Mac Malware: How OS X Threats Have Evolved [Infographic] | CyberSecurity | Apple  | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
This infographic timeline highlights the nastiest, most prevalent Mac OS X security threats to demonstrate just how Mac malware has evolved over the past 10 years.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's insight:
This infographic timeline highlights the nastiest, most prevalent Mac OS X security threats to demonstrate just how Mac malware has evolved over the past 10 years.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Yispecter: Sicherheitsfirma warnt vor neuer iOS-Malware | CyberSecurity | MobileSecurity | Apple

Yispecter: Sicherheitsfirma warnt vor neuer iOS-Malware | CyberSecurity | MobileSecurity | Apple | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Die Malware läuft auch auf iPhones und iPads ohne Jailbreak und erhält durch Nutzung privater APIs weitreichenden Zugriff, erklärt eine Sicherheitsfirma. Die Infektion erfolge auf verschiedenen Wegen.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
Die Malware läuft auch auf iPhones und iPads ohne Jailbreak und erhält durch Nutzung privater APIs weitreichenden Zugriff, erklärt eine Sicherheitsfirma. Die Infektion erfolge auf verschiedenen Wegen.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Macs can be remotely infected with firmware malware that remains after reformatting | Naivety | Nobody Is Perfect

Macs can be remotely infected with firmware malware that remains after reformatting | Naivety | Nobody Is Perfect | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
When companies claim their products are unhackable or invulnerable, it must be like waving a red flag in front of bulls as it practically dares security researchers to prove otherwise. Apple previously claimed that Macs were not vulnerable to the same firmware flaws that could backdoor PCs, so researchers proved they could remotely infect Macs with a firmware worm that is so tough to detect and to get rid of that they suggested it presents a toss your Mac in the trash situation.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike



Gust MEES's insight:
When companies claim their products are unhackable or invulnerable, it must be like waving a red flag in front of bulls as it practically dares security researchers to prove otherwise. Apple previously claimed that Macs were not vulnerable to the same firmware flaws that could backdoor PCs, so researchers proved they could remotely infect Macs with a firmware worm that is so tough to detect and to get rid of that they suggested it presents a toss your Mac in the trash situation.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Thunderstrike



more...
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Apple : les Macs sont de vraies passoires à malwares | CyberSecurity | Awareness | eSkills

Apple : les Macs sont de vraies passoires à malwares | CyberSecurity | Awareness | eSkills | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Le mythe vient de s'effondrer : un chercheur en sécurité vient de démontrer combien il était facile de contourner les mécanismes de sécurité mis en place par Apple dans OS X pour polluer le système avec des malwares.


Finalement, Apple ne fait pas mieux que les autres fabricants ni même éditeurs de solutions de protection, puisque la conférence a démontré que la plupart des outils de protection pouvaient être contournés.


Apple reste toutefois moins sujet aux attaques pour l'instant, mais les choses pourraient changer à l'avenir.


En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Immune+No+More%3A+An+Apple+Story


Gust MEES's insight:
Le mythe vient de s'effondrer : un chercheur en sécurité vient de démontrer combien il était facile de contourner les mécanismes de sécurité mis en place par Apple dans OS X pour polluer le système avec des malwares.


Finalement, Apple ne fait pas mieux que les autres fabricants ni même éditeurs de solutions de protection, puisque la conférence a démontré que la plupart des outils de protection pouvaient être contournés.


Apple reste toutefois moins sujet aux attaques pour l'instant, mais les choses pourraient changer à l'avenir.


En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Immune+No+More%3A+An+Apple+Story


more...
Gust MEES's curator insight, April 27, 2015 8:30 AM
Le mythe vient de s'effondrer : un chercheur en sécurité vient de démontrer combien il était facile de contourner les mécanismes de sécurité mis en place par Apple dans OS X pour polluer le système avec des malwares.


Finalement, Apple ne fait pas mieux que les autres fabricants ni même éditeurs de solutions de protection, puisque la conférence a démontré que la plupart des outils de protection pouvaient être contournés.


Apple reste toutefois moins sujet aux attaques pour l'instant, mais les choses pourraient changer à l'avenir.


En savoir plus / Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Immune+No+More%3A+An+Apple+Story


Scooped by Gust MEES
Scoop.it!

WireLurker, le malware qui menace l’iPhone | Cyber Security

WireLurker, le malware qui menace l’iPhone | Cyber Security | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Une nouvelle génération de malwares

WireLurker semble, pour l’heure, peu dangereux. Néanmoins, Claud Xiao, de Palo Alto Networks, signale que le programme malveillant est « capable de voler un grand nombre de données sur les mobiles qu’il infecte ». De plus, il serait toujours en développement actif et « le but de son créateur n’est toujours pas connu ». La société recommande donc de prendre les précautions adéquates et d’installer une solution de protection contre les menaces sur mobiles (notamment celle éditée par ladite société). 

Le malware est surtout le premier d’une nouvelle famille de logiciels malveillants s’attaquant aux appareils marqués d’une pomme. Outre sa propagation massive, WireLurker est aussi le premier malware à infecter des applications iOS de même manière qu’un virus traditionnel, et le premier à générer automatiquement des programmes malveillants et à installer des applications tierces sur des mobiles non-jailbreakés. 


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=wirelurker



Gust MEES's insight:
Une nouvelle génération de malwares

WireLurker semble, pour l’heure, peu dangereux. Néanmoins, Claud Xiao, de Palo Alto Networks, signale que le programme malveillant est « capable de voler un grand nombre de données sur les mobiles qu’il infecte ». De plus, il serait toujours en développement actif et « le but de son créateur n’est toujours pas connu ». La société recommande donc de prendre les précautions adéquates et d’installer une solution de protection contre les menaces sur mobiles (notamment celle éditée par ladite société). 

Le malware est surtout le premier d’une nouvelle famille de logiciels malveillants s’attaquant aux appareils marqués d’une pomme. Outre sa propagation massive, WireLurker est aussi le premier malware à infecter des applications iOS de même manière qu’un virus traditionnel, et le premier à générer automatiquement des programmes malveillants et à installer des applications tierces sur des mobiles non-jailbreakés. 


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=wirelurker



more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Wirelurker:Trojaner infiziert iPhones und iPads über USB-Verbindung

Wirelurker:Trojaner infiziert iPhones und iPads über USB-Verbindung | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Originalmeldung: Der Trojaner Wirelurker hat wohl bereits viele iPhones und iPads angegriffen: Sicherheitsforscher der Firma Palo Alto Networks haben eine iOS-Malware namens Wirelurker entdeckt, die sich über eine App verbreitet und schon hunderttausende User infiziert haben könnten.

Seinen Ursprung hat der Trojaner wohl in China, die Entdecker berichten, dass anfangs über 400 Apps im Maiyadi App Store, einem alternativen Appstore für OS X, infiziert wurden. Diese Anwendungen greifen dann die iPhones und iPads der Opfer an. Da die betroffenen Apps bislang über 350.000 Mal heruntergeladen wurden, ist die Zahl der theoretisch infizierten Apple-Geräte entsprechend groß.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=wirelurker



Gust MEES's insight:

Originalmeldung: Der Trojaner Wirelurker hat wohl bereits viele iPhones und iPads angegriffen: Sicherheitsforscher der Firma Palo Alto Networks haben eine iOS-Malware namens Wirelurker entdeckt, die sich über eine App verbreitet und schon hunderttausende User infiziert haben könnten.

Seinen Ursprung hat der Trojaner wohl in China, die Entdecker berichten, dass anfangs über 400 Apps im Maiyadi App Store, einem alternativen Appstore für OS X, infiziert wurden. Diese Anwendungen greifen dann die iPhones und iPads der Opfer an. Da die betroffenen Apps bislang über 350.000 Mal heruntergeladen wurden, ist die Zahl der theoretisch infizierten Apple-Geräte entsprechend groß.

Learn more:

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=wirelurker


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Un nouveau malware cible les systèmes OS X et iOS | Cyber Security

Un nouveau malware cible les systèmes OS X et iOS | Cyber Security | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

Des chercheurs en sécurité affirment avoir découvert une nouvelle famille de malwares, lesquels peuvent mettre à mal les appareils d'Apple.
[S5091662W200]]


Afin d'éviter toute propagation de virus ou chevaux de Troie, Apple contrôle très strictement ses systèmes d'exploitation et plus précisément les applications publiées au sein de leurs plateformes de téléchargement respectives. Toutefois le cabinet Palo Alto Networks affirme avoir repéré une nouvelle attaque.

Baptisé WireLurker, le malware en question a été inséré au sein de 467 applications spécialement conçues pour OS X et disponibles sur le répertoire de téléchargements chinois Maiydi App Store, une alternative au Mac App Store officiel. Sur ces six derniers mois, ces 467 applications ont comptabilisé 356 104 téléchargements ; elles ont donc affecté plusieurs centaines de milliers de machines;


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=wirelurker



Gust MEES's insight:

Des chercheurs en sécurité affirment avoir découvert une nouvelle famille de malwares, lesquels peuvent mettre à mal les appareils d'Apple.
[S5091662W200]]


Afin d'éviter toute propagation de virus ou chevaux de Troie, Apple contrôle très strictement ses systèmes d'exploitation et plus précisément les applications publiées au sein de leurs plateformes de téléchargement respectives. Toutefois le cabinet Palo Alto Networks affirme avoir repéré une nouvelle attaque.

Baptisé WireLurker, le malware en question a été inséré au sein de 467 applications spécialement conçues pour OS X et disponibles sur le répertoire de téléchargements chinois Maiydi App Store, une alternative au Mac App Store officiel. Sur ces six derniers mois, ces 467 applications ont comptabilisé 356 104 téléchargements ; elles ont donc affecté plusieurs centaines de milliers de machines;


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=wirelurker


more...
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

The evolution of OS X malware.

The evolution of OS X malware. | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Is there any (Mac) OS X-specific malware around? Oh yes. But for some odd reason I haven't said anything interesting on this topic for quite a while… The last time was two and a half years ago. Yes...


So what can we deduce from these data?


First: cybercriminals find it easiest making money with mostly legal (well, almost legal) approaches. Persistent advertising also makes money, and coupled with large-scale infections – big money.


Second: OS X virus writers are a fairly rare but sophisticated species. Unlike the Windows virus scene, the OS X virus scene bypassed the childish stage of ‘viruses for fun’ and went straight to the grown-up – Mac OS – stuff with all the attendant hardcore malware tricks that are necessary for it. These are serious folks, folks! It’s very likely they honed their skills on the Windows platform first, and then went over to Mac to conquer new, uncharted territory in search of new untapped money-making possibilities. After all, the money’s there, and the users are relatively blasé about security, which means there are plenty of opportunities – for those blackhatters who are willing to put in the work.


Third: professional espionage groups have really taken to exploiting OS X. Many APT attacks in the last few years acquired Mac-modules, for example CaretoIcefog, and the targeted attacks against Uyghur activists. Yes, here we’re talking pinpointed –exclusive as opposed to mass – attacks, aimed at specially chosen victims; this is why they don’t figure in the top-20. Not that they are any less dangerous; especially if your data may be interesting to intelligence agencies.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
Gust MEES's curator insight, September 29, 2014 9:34 AM
Is there any (Mac) OS X-specific malware around? Oh yes. But for some odd reason I haven't said anything interesting on this topic for quite a while… The last time was two and a half years ago. Yes...


So what can we deduce from these data?


First: cybercriminals find it easiest making money with mostly legal (well, almost legal) approaches. Persistent advertising also makes money, and coupled with large-scale infections – big money.


Second: OS X virus writers are a fairly rare but sophisticated species. Unlike the Windows virus scene, the OS X virus scene bypassed the childish stage of ‘viruses for fun’ and went straight to the grown-up – Mac OS – stuff with all the attendant hardcore malware tricks that are necessary for it. These are serious folks, folks! It’s very likely they honed their skills on the Windows platform first, and then went over to Mac to conquer new, uncharted territory in search of new untapped money-making possibilities. After all, the money’s there, and the users are relatively blasé about secu


Quran Coaching's curator insight, October 1, 2014 3:22 AM

The Quran-Coaching is the best platform for the quran learning by taking online quran classes.
http://goo.gl/st4aLZ
Like/Share/Comment.
#quran #onlineQuran #islam #Tajweed

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

8 Ways to Accidentally Infect Your Friends with Malware

8 Ways to Accidentally Infect Your Friends with Malware | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
A lot has been said over the years about the best ways to protect your machine from attacks and malicious code. But where do those recommendations intersect with ways to protect your friends from attacks?

 

By failing to protect your own data, you’re sometimes putting them at risk as well. Here are a few ways people end up mindlessly spreading the malware love....

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

Check also:

 

https://gustmees.wordpress.com/

 

https://gustmeesen.wordpress.com/

 

https://gustmeesfr.wordpress.com/

 

more...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Apple Hack Signals No Company Is Safe From Latest Malware Attack

Apple Hack Signals No Company Is Safe From Latest Malware Attack | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Apple said Tuesday its employees' computers had been hacked, signaling that even a company once thought to be hacker-proof is vulnerable to a sophisticated attack that has claimed a growing number of victims.
Gust MEES's insight:

Nor are the private persons!!!

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

more...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

New Mac Malware Scams Users Into Signing Up For Cellphone Charges - Forbes

New Mac Malware Scams Users Into Signing Up For Cellphone Charges - Forbes | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
A screenshot of the fraudulent installer asking for a Mac user's phone number.

Time for Apple users to heed a lesson Windows users have long learned the hard way: Don’t hand out your cell phone number to untrusted applications downloaded from the Web.

On Tuesday, Russian antivirus firm Doctor Web reported the appearance of a new strain of Mac-focused malware that queries users for their cellphone number when they try to install a piece of legitimate software. If the user enters a phone number, he or she receives a text message asking for a reply with a registration code. Responding implicitly signs up the user for a series of recurring mobile charges to their carrier’s account.

Read more, a MUST:
http://www.forbes.com/sites/andygreenberg/2012/12/12/new-mac-malware-scams-users-into-signing-up-for-cellphone-charges/?utm_campaign=techtwittersf&utm_source=twitter&utm_medium=social
Gust MEES's insight:

"Apple's slogan was =>'Think Different' <= + with ALL the malware around YOU should do so + get protection as well as #ProactiveThinking ;) 

more...
Gust MEES's curator insight, December 12, 2012 7:06 PM

"Apple's slogan was =>'Think Different' <= + with ALL the malware around YOU should do so + get protection as well as #ProactiveThinking ;)

 


Scooped by Gust MEES
Scoop.it!

Un nouveau malware découvert sur iOS | #AceDeceiver #Apple #CyberSecurity #CyberCrime #iPad #iPhone 

Un nouveau malware découvert sur iOS | #AceDeceiver #Apple #CyberSecurity #CyberCrime #iPad #iPhone  | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Décidément les chercheurs du Palo Alto Networks ont fort à faire ces dernières semaines. Après le ransomware KeRanger détecté sur MacOSX, c'est au tour d'iOS d'être touché par un nouveau malware. Toutefois, AceDeceiver fait dans la nouveauté. Au lieu d'essayer de leurrer les systèmes d'Apple, ce dernier a trouvé un moyen de pénétrer iOS sans même avoir besoin d'un quelconque certificat.

Habituellement lorsqu'un utilisateur achète et télécharge des applications depuis iTunes/App Store, la boutique demande obligatoirement un code d'autorisation afin d'approuver et de sécuriser l'installation. 
Dans le cas de cette attaque, les hackers ont exploité une faille pour récupérer le code généré par iTunes. De cette manière, ils peuvent installer n'importe quelle application souhaitée sur appareil. Ils ont par la suite développé un logiciel qui simule le comportement d'un client iTunes cela permet de leurrer le système qui pense que l'application a bien été achetée et qu'elle est sécurisée. L'installation de l'application corrompue ce fait alors sans aucun problème sur votre appareil.

Ce type d'attaque "man in the middle" est très problématique car quand bien même les applications corrompues sont supprimées de l'App Store, la faille reste accessible. 

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=AceDeceiver

 

Gust MEES's insight:
Décidément les chercheurs du Palo Alto Networks ont fort à faire ces dernières semaines. Après le ransomware KeRanger détecté sur MacOSX, c'est au tour d'iOS d'être touché par un nouveau malware. Toutefois, AceDeceiver fait dans la nouveauté. Au lieu d'essayer de leurrer les systèmes d'Apple, ce dernier a trouvé un moyen de pénétrer iOS sans même avoir besoin d'un quelconque certificat.

Habituellement lorsqu'un utilisateur achète et télécharge des applications depuis iTunes/App Store, la boutique demande obligatoirement un code d'autorisation afin d'approuver et de sécuriser l'installation. 
Dans le cas de cette attaque, les hackers ont exploité une faille pour récupérer le code généré par iTunes. De cette manière, ils peuvent installer n'importe quelle application souhaitée sur appareil. Ils ont par la suite développé un logiciel qui simule le comportement d'un client iTunes cela permet de leurrer le système qui pense que l'application a bien été achetée et qu'elle est sécurisée. L'installation de l'application corrompue ce fait alors sans aucun problème sur votre appareil.

Ce type d'attaque "man in the middle" est très problématique car quand bien même les applications corrompues sont supprimées de l'App Store, la faille reste accessible. 

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=AceDeceiver

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

iOS malware AceDeceiver can infect non-jailbroken Apple devices | #iPad #iPhone

iOS malware AceDeceiver can infect non-jailbroken Apple devices | #iPad #iPhone | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
This new strain of malware designed for the iPhone and iPad poses a major risk to hundreds of millions of devices, because it can infect non-jailbroken devices without the user's knowledge.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=AceDeceiver

 

 

Gust MEES's insight:
This new strain of malware designed for the iPhone and iPad poses a major risk to hundreds of millions of devices, because it can infect non-jailbroken devices without the user's knowledge.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=AceDeceiver

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac OS X malware is heating up | Apple | Nobody Is Perfect | CyberSecurity

Mac OS X malware is heating up | Apple | Nobody Is Perfect | CyberSecurity | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
A new threat research report conducted by Bit9+ Carbon Black’s research team found that in 2015, there was 948 malware instances. The number of  OS X malware samples this year is five times greater than in 2010-2014 combined — where there was only 180 malware instances over a four-year period. Based on observations in a 10-week analysis: the research team anticipates MAC OS X malware to surge in the coming months.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
A new threat research report conducted by Bit9+ Carbon Black’s research team found that in 2015, there was 948 malware instances. The number of  OS X malware samples this year is five times greater than in 2010-2014 combined — where there was only 180 malware instances over a four-year period. Based on observations in a 10-week analysis: the research team anticipates MAC OS X malware to surge in the coming months.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Researcher demonstrates how malware can bypass OS X's "completely broken" Gatekeeper | Nobody Is Perfect | Apple

Researcher demonstrates how malware can bypass OS X's "completely broken" Gatekeeper | Nobody Is Perfect | Apple | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Virus Bulletin 2015, Prague - Researcher Patrick Wardle says he "loves his Mac, but it's so easy to hack".

At the VB2015 conference in Prague earlier today, Wardle explained to members of the security community how he had uncovered a way to easily waltz past one of the key safeguards that Apple built into its OS X operating system to block unauthorised code, downloaded from the internet, from running.

Generally, Gatekeeper does a reasonable job.

If an app is developed by an unknown developer, or has been tampered with en route to your computer via a man-in-the-middle attack over an unencrypted HTTP connection, then Gatekeeper is supposed to spot it and block it.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
Virus Bulletin 2015, Prague - Researcher Patrick Wardle says he "loves his Mac, but it's so easy to hack".

At the VB2015 conference in Prague earlier today, Wardle explained to members of the security community how he had uncovered a way to easily waltz past one of the key safeguards that Apple built into its OS X operating system to block unauthorised code, downloaded from the internet, from running.

Generally, Gatekeeper does a reasonable job.

If an app is developed by an unknown developer, or has been tampered with en route to your computer via a man-in-the-middle attack over an unencrypted HTTP connection, then Gatekeeper is supposed to spot it and block it.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Security hole in MacKeeper used to shove malware onto Macs

Security hole in MacKeeper used to shove malware onto Macs | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

Researchers at BAE just reported on a Mac bot known as OSX/Agent-ANTU that was allegedly distributed in a novel way.

The crooks used a security hole in a controversial Mac security and cleanup utility called MacKeeper.

MacKeeper quickly patched the hole after it became known, but until you received the update you were at risk of a Remote Code Execution (RCE) hole.

As long as you were unpatched, a crook could simply entice or redirect you to a poisoned website, and use a single line of JavaScript to send a command script to MacKeeper, which would then run it.

Unfortunately, according to BAE, some crooks struck while the iron was hot.

The crooks sent unpatched MacKeeper users to a web page that tricked their Macs into downloading the OSX/Agent-ANTU malware.


Here are some examples we've seen over the years where the Windows malware "playbook" has been followed, in some cases extremely effectively, on OS X:


2012: Java-based exploit. The Flashback malware was injected onto your Mac via an unpatched Java bug. Flashback was a bot, or zombie, meaning that crooks could remotely send it instructions to help them commit further cybercrime. Estimates suggest that more than 600,000 Macs ended up infected, supposedly including "274 from Cupertino."


2013: Word-based exploit. SophosLabs reported on attackers using an exploitable bug in Microsoft Word for Mac to target Chinese minority groups. If you opened a booby-trapped document, disguised as some sort of political commentary, the crooks got control of your Mac via zombie malware called OSX/Agent-AADL.


2014: Fake "undelivered item" documents. If you opened the bogus PDF file, really an application in disguise, you could end up infected with a data-stealing Trojan called OSX/LaoShu-A. Amongst other things, this one would find files such as documents, spreadsheets, presentations and archives...and send them to the crooks.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security




Gust MEES's insight:

Researchers at BAE just reported on a Mac bot known as OSX/Agent-ANTU that was allegedly distributed in a novel way.

The crooks used a security hole in a controversial Mac security and cleanup utility called MacKeeper.

MacKeeper quickly patched the hole after it became known, but until you received the update you were at risk of a Remote Code Execution (RCE) hole.

As long as you were unpatched, a crook could simply entice or redirect you to a poisoned website, and use a single line of JavaScript to send a command script to MacKeeper, which would then run it.

Unfortunately, according to BAE, some crooks struck while the iron was hot.

The crooks sent unpatched MacKeeper users to a web page that tricked their Macs into downloading the OSX/Agent-ANTU malware.


Here are some examples we've seen over the years where the Windows malware "playbook" has been followed, in some cases extremely effectively, on OS X:


2012: Java-based exploit. The Flashback malware was injected onto your Mac via an unpatched Java bug. Flashback was a bot, or zombie, meaning that crooks could remotely send it instructions to help them commit further cybercrime. Estimates suggest that more than 600,000 Macs ended up infected, supposedly including "274 from Cupertino."


2013: Word-based exploit. SophosLabs reported on attackers using an exploitable bug in Microsoft Word for Mac to target Chinese minority groups. If you opened a booby-trapped document, disguised as some sort of political commentary, the crooks got control of your Mac via zombie malware called OSX/Agent-AADL.


2014: Fake "undelivered item" documents. If you opened the bogus PDF file, really an application in disguise, you could end up infected with a data-stealing Trojan called OSX/LaoShu-A. Amongst other things, this one would find files such as documents, spreadsheets, presentations and archives...and send them to the crooks.


So, if you haven't yet crossed the bridge and become a Mac anti-virus user, now would be a good time to give it a go.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security



more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Where Did VirusBarrier iOS Go? | MobileSecurity | CyberSecurity

Where Did VirusBarrier iOS Go? | MobileSecurity | CyberSecurity | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Apple has elected to eliminate the category of anti-virus and anti-malware products from their iOS App Store.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Most+vulnerable+operating+systems+and+ap


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


https://gustmees.wordpress.com/2015/03/07/facts-to-convince-someone-for-the-must-of-learning-basics-of-cybersecurity-digital-citizenship/


Gust MEES's insight:
Apple has elected to eliminate the category of anti-virus and anti-malware products from their iOS App Store.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Most+vulnerable+operating+systems+and+ap


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


https://gustmees.wordpress.com/2015/03/07/facts-to-convince-someone-for-the-must-of-learning-basics-of-cybersecurity-digital-citizenship/


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

OS X malware infecting connected iPhones, iPads | Cyber Security

OS X malware infecting connected iPhones, iPads | Cyber Security | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it

According to Palo Alto Networks, WireLurker, running on an OS X system, can install either downloaded third-party applications or automatically generate malicious applications onto a USB-connected iOS device, regardless of whether it is jailbroken.

The malware is able to install malicious and infected programs on non-jailbroken iOS devices, according to the report, by using enterprise provisioning techniques, thus appearing to be an in-house application. The user is presented with a confirmation dialog box such as the one shown below, but otherwise the application will behave the same as an uninfected one.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=wirelurker



Gust MEES's insight:

According to Palo Alto Networks, WireLurker, running on an OS X system, can install either downloaded third-party applications or automatically generate malicious applications onto a USB-connected iOS device, regardless of whether it is jailbroken.

The malware is able to install malicious and infected programs on non-jailbroken iOS devices, according to the report, by using enterprise provisioning techniques, thus appearing to be an in-house application. The user is presented with a confirmation dialog box such as the one shown below, but otherwise the application will behave the same as an uninfected one.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=wirelurker


more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

WireLurker: A new breed of iOS and OS X malware that has infected thousands | Cyber Security

WireLurker: A new breed of iOS and OS X malware that has infected thousands | Cyber Security | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
In short, the initial WireLurker infection comes from a third-party Mac OS X app store (in this case, the Chinese Maiyadi app store). Once you download and install an infected app onto your OS X machine, that’s where the fun begins. If you then plug an iOS device into an infected OS X machine, WireLurker installs itself on the iOS device. By using iOS’s enterprise provisioning system — a method usually reserved for companies to side-load apps directly onto corporate iOS devices — WireLurker can even infect non-jailbroken devices.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=wirelurker



Gust MEES's insight:
In short, the initial WireLurker infection comes from a third-party Mac OS X app store (in this case, the Chinese Maiyadi app store). Once you download and install an infected app onto your OS X machine, that’s where the fun begins. If you then plug an iOS device into an infected OS X machine, WireLurker installs itself on the iOS device. By using iOS’s enterprise provisioning system — a method usually reserved for companies to side-load apps directly onto corporate iOS devices — WireLurker can even infect non-jailbroken devices.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=wirelurker



more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

WireLurker: A New Era in OS X and iOS Malware | Cyber Security

WireLurker: A New Era in OS X and iOS Malware | Cyber Security | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
WireLurker monitors any iOS device connected via USB with an infected OS X computer and installs downloaded third-party applications or automatically generated malicious applications onto the device, regardless of whether it is jailbroken. This is the reason we call it “wire lurker”. Researchers have demonstrated similar methods to attack non-jailbroken devices before; however, this malware combines a number of techniques to successfully realize a new brand of threat to all iOS devices.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=wirelurker


Gust MEES's insight:
WireLurker monitors any iOS device connected via USB with an infected OS X computer and installs downloaded third-party applications or automatically generated malicious applications onto the device, regardless of whether it is jailbroken. This is the reason we call it “wire lurker”. Researchers have demonstrated similar methods to attack non-jailbroken devices before; however, this malware combines a number of techniques to successfully realize a new brand of threat to all iOS devices.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security?q=wirelurker


more...
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Hackers target Apple Mac OS X with 25 malware variants

Hackers target Apple Mac OS X with 25 malware variants | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


more...
Gust MEES's curator insight, September 9, 2014 10:12 AM
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Mac malware found in malformed Word documents - is China to blame?

Mac malware found in malformed Word documents - is China to blame? | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Minority groups in China appear to have been targeted by a Mac malware attack, delivered via boobytrapped Word documents.

Who could possibly be interested in targeting their computers?

 

It is true that there is much less malware for OS X than there is for Windows, but that's not going to make you feel any better if you end up targeted in an attack like this.

 

Mac users, just like Windows users, need to ensure that they install the latest security patches and keep their software properly up-to-date.

If you're not already doing so, run anti-virus software on your Macs.

 

If you're a home user, there really is no excuse at all as we offer a free anti-virus for Mac consumers.

 

Gust MEES's insight:

 

It is true that there is much less malware for OS X than there is for Windows, but that's not going to make you feel any better if you end up targeted in an attack like this.

 

Mac users, just like Windows users, need to ensure that they install the latest security patches and keep their software properly up-to-date.

If you're not already doing so, run anti-virus software on your Macs.

 

If you're a home user, there really is no excuse at all as we offer a free anti-virus for Mac consumers.

 

 Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

more...
Gust MEES's curator insight, April 25, 2013 2:41 PM

 

It is true that there is much less malware for OS X than there is for Windows, but that's not going to make you feel any better if you end up targeted in an attack like this.

 

Mac users, just like Windows users, need to ensure that they install the latest security patches and keep their software properly up-to-date.

If you're not already doing so, run anti-virus software on your Macs.

 

If you're a home user, there really is no excuse at all as we offer a free anti-virus for Mac consumers.

 

 Learn more: 

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Macs hit by new wave of money-stealing malware 

Macs hit by new wave of money-stealing malware  | Apple, Mac, iOS4, iPad, iPhone and (in)security... | Scoop.it
Apple users who think they're immune to malware and other bugs need to pay attention: A new Trojan is infecting Apple computers in order to obtain victims' phone numbers and rob them via unexpected premium SMS charges.

The Trojan, which masks itself as downloadable software, presents victims with a legitimate-looking installation wizard that asks for their phone number in order to verify or authenticate the install.

Read more:
http://www.nbcnews.com/technology/technolog/macs-hit-new-wave-money-stealing-malware-1C7563684
more...
Gust MEES's curator insight, December 13, 2012 2:52 PM

Nobody is perfect! "Apple's slogan was =>'Think Different' <= #Mac + #Apple users ===> SO DO SO + get protected ;) #Learning basics of #Cybersecurity