A Bite Of The Apple

One of Apple’s many selling points, beyond the cool factor and lifestyle connectivity, is the relative security of Apple products, partly because of architecture and partly because their market share of end users remains relatively low. More people, it seems, prefer other hardware and operating systems. The only outlier may be the iPhone, so let’s assume that to be the case — and forgo all the market data that might support it — for the sake of this discussion.

In our assumption of the dominance of the iPhone in its space, researchers may have discovered a new way to take a bite out of that Apple in someone’s hand. It involves the user’s connection to iTunes and their opting to synch over Wi-Fi, one of the options for connecting. Users are prompted to “trust” the computer they’re connecting to, and the language of that prompt suggests that the trust is necessary only as long as the phone is connected. Security Week writes that researchers have found that, to paraphrase Twain, “It ain’t what you don’t know, it’s what you know for certain that ain’t necessarily so.”

Bigger Name On The Other Line

While “Trustjacking” is just one of the latest potential attack methods, it is representative of far more than that specific vulnerability. Clever minds sometimes collide with nefarious purposes, and it seems their appetite is insatiable. To keep up with the evolution of cyberthreats seems an impossible task, and perhaps it is. But there are clever folks with good intentions fighting that good fight every day, and ICS is proud to call many of them family.

So before your network or data get a call from the dark side, call ICS. We earn the trust of our clients every day, and we’d like to earn yours.

ISO 9001 2015Technology Industry InnovatorsVeteran Owned Small BusinessCMMI Maturity Level 3CISSP® - Certified Information Systems Security ProfessionalCertified Penetration TesterITIL IT Service ManagementCertified Ethical HackerProject Management Institute CertifiedUS Department of Homeland SecurityDisaster Recovery Institute CertifiedCertified Information Systems Auditor