Comment: Good read on security myths and why they still persist.
==================================================================================================
by https://mailto:mzorz%28at%29net-security.org - Editor in Chief - Tuesday, 5 August 2014.
In this interview, Zuk Avraham, CEO of Zimperium, talks about iOS security myths and threats, discusses the difficulties in exploring iOS security vs. "breaking" Android and offers advice to those managing a variety of iOS devices in a large organization.
What are today's most striking iOS security myths? Why do they still persist?
The biggest iOS security myth I've seen is that, because of Apple's "walled garden" approach and curation of its App Store, iOS devices are safe from all cyber attacks. On the contrary, both iOS and Android are vulnerable to multiple attack vectors, of which apps are only one subcategory. These attacks fall into three categories: rogue access points/base station attacks, network attacks (i.e., network recon scans, man-in-the-middle and SSL stripping techniques) and host attacks (i.e., browser attacks, malicious apps and PDFs, operating system/Kernel attacks).
Help Net Security/ Full Article Here/ http://www.net-security.org/article.php?id=2089
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.