How to Protect iPhones and iPads from Cyberattacks
How to Protect iPhones and iPads from Cyberattacks
Apple has built a solid reputation for producing secure mobile devices. Some of the tech giant's customers believe that Apple products are so secure that they do not need to take any additional security measures. However, Apple's mobile devices are not without their flaws. There are known vulnerabilities in the iOS operating system and in the devices' built-in apps. Plus, malware and third-party apps can put these devices at risk. Knowing about these security risks can help you better protect your mobile devices. Here is how to protect iPhones and iPads from Cyberattacks.
Vulnerabilities in the Operating System and Built-In Apps
Apple's iOS operating system has had some security problems. In November 2015, Zerodium announcedthat an anonymous team of researchers successfully hacked Apple's iOS 9 operating system. The team received $1 million for its efforts. Zerodium pays for security exploits that are not publicly available, selling them to the highest bidders. Because Zerodium sells the exploits it purchases, it is tight-lipped about the iOS 9 hack. However, to get the $1 million bounty, the hack had to meet certain criteria, which means that:- It works on versions of iPhone 6, iPhone 5, and iPad running iOS 9.
- It bypasses all iOS 9 security defences using previously unknown vulnerabilities or exploits.
- It starts one of four ways. The attack vector might be a web page that either targets the mobile browser (Apple Safari or Google Chrome) or targets a web application reachable through the browser. Alternatively, the attack vector might be a text message delivered through the Short Message Service or a multimedia file delivered through the Multimedia Messaging Service.
- It leads to the installation of a malicious app on a fully updated iOS 9 device.
- It works remotely and silently, without any user interaction except for when the user initially visits the malicious web page or opens the infected text message or multimedia file.
Malicious Malware and Unsafe Third-Party Apps
Apple mobile devices are vulnerable to malicious malware like WireLurker. WireLurker spreads to iOS devices when they are connected to infected computers. Palo Alto Networks discovered this malware, which steals information from the mobile devices it infects. Third-party apps can also install malware and other potentially malicious code on Apple mobile devices. You cannot even assume that the apps you download from Apple's App Store are safe to use, as the following incidents show:- In September 2015, Palo Alto Networks revealed that 39 apps in Apple's App Store were infected by malware named XcodeGhost. Cybercriminals can use XcodeGhost's remote control functionalities to perform phishing and other types of attacks.
- In October 2015, SourceDNA discovered that hundreds of apps in the App Store were collecting more device and user data than what Apple allows. The additional data collected included the device's serial number, the serial numbers of peripherals (e.g., the battery system), a list of installed apps, and a numeric value associated with the user's Apple ID.
- In October 2015, Apple found that some App Store apps were installing root certificates that allowed the app developers to access the app users' encrypted traffic. While the certificates were being used for legitimate purposes, they left the mobile devices open to man-in-the-middle attacks. In this type of attack, cybercriminals insert themselves between two communicating parties. They then intercept data, decrypt it if necessary, and steal any personal information.
how to protect iPhones and iPads from Cyberattacks
Apple mobile devices have security vulnerabilities, so you need to take some security precautions. Make sure that you:- Install all iOS updates promptly.
- Use strong passwords for all your accounts. Resist the temptation to use the same password for multiple accounts. If you have to remember a lot of account passwords, consider using a password manager. That way, you will not be tempted to re-use passwords or write them down.
- Do not connect your mobile device to public computers. Only connect your device to computers you know are secure.
- Research an app before you install it, even if you are downloading it from Apple's App Store.
- Do not open any email messages from unknown senders. If a message is from someone you know but looks suspicious, call that person and confirm that he or she sent it.
- Scrutinise any pop-up messages that you receive when working in the email client. A pop-up message is a fake if it appears only in the email message's body or if it scrolls down when you scroll through the message.