TechnoclinicTechnoclinic
  • Home
  • APPS
  • CAMERAS
    • PRINTERS
  • GAMING
    • LAPTOPS
  • HDTV
  • NEWS
  • PHONES
    • TABLETS
  • REVIEWS
  • SOFTWARE
  • Contact Us!
Search
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: iOS MDM Protocol Vulnerability Exposes iPhone, iPad to Attack: Report
Share
Sign In
Aa
TechnoclinicTechnoclinic
Aa
Search
  • Home
  • APPS
  • CAMERAS
    • PRINTERS
  • GAMING
    • LAPTOPS
  • HDTV
  • NEWS
  • PHONES
    • TABLETS
  • REVIEWS
  • SOFTWARE
  • Contact Us!
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Technoclinic > PHONES > iOS MDM Protocol Vulnerability Exposes iPhone, iPad to Attack: Report
PHONES

iOS MDM Protocol Vulnerability Exposes iPhone, iPad to Attack: Report

srijita
Last updated: 2016/04/04 at 4:14 PM
srijita
Share
SHARE
iOS MDM Protocol Vulnerability Exposes iPhone, iPad to Attack: Report

Another vulnerability has been found in iOS, Apple’s mobile operating system. The mobile device management (MDM) interface for iOS, according to security researchers, can be exploited to gain complete access to the device. Apple insists that it’s not a vulnerability, but a social-engineering trick.

Security researchers at Check Point Software Technologies claim that an approach dubbed “SideStepper” can allow an attacker to hijack enterprise management functions by sending a malicious link to the device.

According to the researchers, clicking on that link will give attackers full control of the MDM software, and allow them to push malicious apps to the device as well as make changes to other configuration settings. In other words, MDM software in iOS is susceptible to man-in-the-middle attacks and can be exploited to install malware on non-jailbroken devices. The vulnerability was demonstrated at Black Hat Asia 2016.

The researchers claim that Apple patched a similar vulnerability last year with iOS software update, however, it left one hole. These MDM tools are used by companies to control, and configure their employees’ devices. These devices have access to a private app store.

Speaking to Ars Technica, Apple has refuted the claims, adding that it was a social-engineering attack, and per se, not a weakness in iOS. “This is a clear example of a phishing attack that attempts to trick the user installing a configuration profile and then installing an app,” a spokesperson for the company told the publication.

“This is not an iOS vulnerability. We’ve built safeguards into iOS to help warn users of potentially harmful content like this. We also encourage our customers to download from only a trusted source like the App Store and to pay attention to the warnings that we’ve put in place before they choose to download and install untrusted content.”

[“source-ndtv”]

TAGGED: Attack, Exposes, iOS, iPad, iPhone, MDM, Protocol, Report, to, Vulnerability

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
srijita April 4, 2016
Share this Article
Facebook Twitter Copy Link Print
Share
Previous Article Motorola Moto X3 With 5-Inch Display Spotted in Zauba Listings
Next Article Reach Opulent With 5-Inch HD Display Launched at Rs. 3,599

Latest News

How to Prepare for the Mandatory Windows 11 Upgrade
LAPTOPS
How to Clean Your Flat-Screen TV The Right Way
HDTV
AI and Content Management: How Organizations Can Prepare for the Future
SOFTWARE
What is Application Software: Function and Features of Application
APPS
Case Study: Nissan and Teads’ Immersive Concept Car Campaign Transformed Scrolls into Stories
NEWS
Review of Hootsuite: Advantages, Drawbacks, Features, and Other Options
REVIEWS

Most Viewed Posts

  • Bengaluru Lady Turns Blinkit Conveyance Specialist For A Day And Her Choice Prompted Significant Changes In Application (1,240)
  • Choosing the Right Tablet for Blogging and Writing On the Go (1,159)
  • How to Start a Product Review Blog (Templates & Examples) (1,106)
  • How To Start A Review Blog and Get Free Review Products (1,096)
  • What You Need to Know About Smartphones vs. Tablet use of the Mobile Internet (1,075)

© 2023 TechnoClinic Network. TechnoClinic Company. All Rights Reserved.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?