Get started

By signing up, you agree to our Terms of Use and Privacy Policy.
Reset your password
Enter your email and we'll send you instructions on how to reset your password.

IOS

IOS uses proprietary software. The attacks on these phones are limited since they are not open source systems.

IOS
Image Source: https://intellipaat.com/tutorial/ios-tutorial/ios-architecture/

Types of IOS Attacks:

Jailbreaking: 

Jailbreaking may put the device at risk. It is done to gain administrative privileges and to download third-party application extensions, etc. Though, the device may lose its warranty, get infected with malware, drop in performance, etc. There are three ways jailbreaking can be done-

Tethered:

After a device is jailbroken, it will no longer have a patched kernel; it might go to a partially functioning state and requires re-jailbreaking using the same computer.

Semi-tethered:

When the device is turned off and on, it will no longer be jailbroken. The device can be used for normal functions.

Untethered:

The device once jailbroken remains jailbroken, and the kernel will be patched completely after reboot.

Countermeasures:

  • Do not jailbreak the device.

  • Apply strong encryption.

  • Always connect to safe networks.

  • Follow common security guidelines.

  • Do not open links/attachments from unknown sources.


0 Comments

Add Comment

Subject to Moderate