What Every Employer Needs to Know About Apple’s iPhone 5

Some people argue that Apple iPhone products are the best line of smartphones on the planet. It would be difficult to disagree with them. Apple consistently creates superb devices that combine modern aesthetics, famously tight security and excellent functionality into a stylish package.

Apple iPhones are governed by the iOS series of operating systems, typically noted for stability, security and a fantastic user interface. However, recent versions of the operating system have a series of flaws and exploits that can leave businesses open to different types of attack and malicious behavior.

Password Theft

If your business uses the iPhone 5, or the most recent iPhone release, you may be susceptible to a flaw in security discovered by researchers from Indiana University, Georgia Tech and Peking University. They found a way to intercept password data from other apps despite the fact that Apple claims they designed the system to prevent one app from stealing data from another. In fact, the researchers were able to also bypass the security of the Apple store as a whole by getting an app that contained malware approved for distribution.

This security vulnerability works by hijacking a browser extension that communicates password data. Hackers can also delete passwords to force users to input them again, thus capturing more password data. Apple asked the researchers to hide the flaw, which was discovered in October 2014, to prevent the spread of information to hackers who could potentially devise a way to put it to use.

Unauthorized cross-app resource access, or XARA for short, presents a security flaw that Apple is having a great deal of difficulty solving due to its complexity, threatening more than 85 percent of all apps with potential password theft.

Threats Avoided Through the New Patch

Patching your iPhone 5 the moment a new update becomes available is the best way to prevent the flaws and hacks that the previous version had within the operating system. One of the more famous flaws that the recent patch eliminated was a weakness in cryptography that allowed hackers to eavesdrop on communications. Other flaws that the patch destroys includes remote code execution and unauthorized termination of apps, a few of the more than 20 fixes applied to version 8.4 of the iOS.

Making sure your iPhone 5 has its software up to date helps get rid of security flaws that lead to a serious hack. While the app store does closely monitor incoming programs for malware, all the different security flaws recently revealed suggest that it’s best not to download apps that you may not be familiar with, even if they’re within the walled garden of the Apple store.

Previous Post
Innovation at Its Best: Full Disk Encryption Market Outlook
Next Post
Vulnerability of Samsung Galaxy S5 Places Workers at Risk

Related Posts

Educate Yourself on Data Privacy Day

Today we celebrate Data Privacy Day! Created and led through Stay Safe Online and the National Cyber Security Alliance. This day is celebrated by organizations across the United States, Canada and Europe to create awareness about the importance of privacy…
Read more

A new year, same mistakes

It’s 2013 and everything old is new again. It’s 10 days into the year and so far we’ve heard about at least two key data thefts and a summary penalty for exposing personal health info in the U.S. (more…)
Read more

Maturity Model

As the environment and industry becomes increasingly data driven, data encryption and data security become top of mind among most IT administrators.   (more…)
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.