Top
item

XcodeGhost Another Crack In Apple’s Circle of Trust

September 21, 2015

Via: malware
Category:

On the heels of KeyRaider’s attack on jailbroken iPhones, attackers show they can hit non-broken devices too, sneaking 39 weaponized apps onto the official and around ‘s best efforts to lock down its developer environment.

Although Apple’s closed development environment has largely succeeded in keeping the App Store relatively free of malicious Mac and apps, Apple’s borders have begun to show some weak spots. , detailed by Palo Alto Networks, is the most recent example, and the most critical.

Read More