iBackDoor: High-Risk Code Hits iOS Apps
November 4 2015Introduction FireEye mobile researchers recently discovered potentially “backdoored” versions of an ad library embedded in thousands of iOS apps originally published in the Apple App...
Read moreiBackDoor: High-Risk Code Hits iOS Apps
November 4 2015Introduction FireEye mobile researchers recently discovered potentially “backdoored” versions of an ad library embedded in thousands of iOS apps originally published in the Apple App...
Read moreiBackDoor: High-Risk Code Hits iOS Apps
November 4 2015Introduction FireEye mobile researchers recently discovered potentially “backdoored” versions of an ad library embedded in thousands of iOS apps originally published in the Apple App...
Read moreiBackDoor: High-Risk Code Hits iOS Apps
November 4 2015Introduction FireEye mobile researchers recently discovered potentially “backdoored” versions of an ad library embedded in thousands of iOS apps originally published in the Apple App...
Read moreXcodeGhost S: A New Breed Hits the US
November 3 2015Just over a month ago, iOS users were warned of the threat to their devices by the XcodeGhost malware. Apple quickly reacted, taking down infected apps from...
Read moreXcodeGhost S: A New Breed Hits the US
November 3 2015Just over a month ago, iOS users were warned of the threat to their devices by the XcodeGhost malware. Apple quickly reacted, taking down infected apps from...
Read moreXcodeGhost S: A New Breed Hits the US
November 3 2015Just over a month ago, iOS users were warned of the threat to their devices by the XcodeGhost malware. Apple quickly reacted, taking down infected apps from...
Read moreXcodeGhost S: A New Breed Hits the US
November 3 2015Just over a month ago, iOS users were warned of the threat to their devices by the XcodeGhost malware. Apple quickly reacted, taking down infected apps from...
Read moreiBackDoor: High-risk Code Sneaks into the App Store
October 26 2015The library embeds backdoors in unsuspecting apps that make use of it to display ads, exposing sensitive data and functionality. The backdoors can be controlled remotely by...
Read more
Recent Comments