How Vulnerable Is iPhone's Security Measures


0
 Advanced issues found
 

The iPhone has been taking massive blows in terms of security and privacy for the last 6 years. Whether it is the NSA or hackers, Apple’s iPhone is always facing defeat in the war for privacy and security.

After the iCloud servers were hacked by hackers back in August 31st, 2014, iOS users developed a sense of paranoia for their iPhones and iPad, questioning their decision to use the handheld devices instead of the Android OS. 

Increase in Malware Threats for iPhone

iPhone always received special attention from malware – in a wrong way that is.  According to an article on “Yahoo Tech” last year, malware such as YiSpecter are on the loose and are targeting iOS-based devices including iPhone, iPad, and iPod. This malware cloaks itself as a genuine Apple application and then tampers with the phone’s system, ROM, RAM, etc.

YiSpecter wasn’t the only malware that managed to destabilize iPhone’s firewall and encryption; there was another malware called “XCodeGhost” that did its job quite nicely as well. According to Stuff.TV, the “XCodeGhost” manages to nab your credentials through key-logging and disruption of social media apps like Facebook, WeChat, Viber, and SnapChat. 

iPhone’s Vulnerabilities Against WiFi’s

Last year, there was a malware found on public WiFi’s that crippled users’ iPhones and iPads and forced them to reboot and refresh every other minute. According to “The Guardian,” many iPhone and iPad users had to trash their devices, as the malware eventually corrupted the phones core programming through constant re-bootings and refreshes.

The malware exposed the security risks that iPhone users face when using public WiFi HotSpots. Most pubic WiFi HotSpots are unprotected, which allow hackers and malware designers to inject malicious code into the router’s framework, thereby efficiently targeting the users who connect to the WiFi HotSpot.

iPhone users now use encryption and tunneling tools to ensure that they stay safe when connecting to WiFi HotSpots. Similarly, public HotSpot providers now take special care to ensure that they configure advanced encryption on their routers. 

Flaws in the iPhones Core System

According to a research conducted by the delegates of Indiana University and the Georgia University Of Technology, there is a flaw in iOS security tools that allow malicious data and apps to penetrate users’ personal information like passwords and credit card numbers – because of a vulnerability in Apple’s “KeyChain Service.”

Apple’s “KeyChain Service” is a feature for iPhone users to help save usernames and passwords for Apple applications. Apple hasn’t released a stable patch for the vulnerability, and user data security remains threatened.

However, data theft on account of the KeyChain Service vulnerability can be prevented with the usage of a VPN that ensures users’ confidentiality through encryption and connection tunneling. 

Diminishing Privacy & Government Surveillance

Apple and the NSA have conflicted with each other, on this issue, for over a decade now. Allegedly, the NSA has been implanting spyware on individual iPhones through AppStore downloads which manipulate the iPhone’s OS to send users’ information to the NSA unnoticed. This was also testified by Edward Snowden in one of his expos when he blew the whistle on the NSA’s “DROPOUTJEEP” program.

Project “DropOutJeep” was run by the NSA to retain users’ data through AppStore downloads. This project consisted of spyware that would implant itself on the targeted iPhone and allow NSA agents to extract and push data on the individual’s iPhone.

Recently, the NSA went berserk, trying to crack through Apple’s encryption and firewall. A shooting incident in California initiated this beef between the two, but the debate on state security seems to be a cover-up for the NSA’s push to penetrate deeper into Apple’s user privacy software architecture.

According to the Wall Street Journal, the NSA is leveraging the Justice Department’s system to push Apple Inc. into decrypting other iPhones besides the shooter’s phone, for inspection and investigation. If this happens, the collateral damage will come in the form of the death of privacy of iPhone users across America.

Every iPhone User for Himself

The iPhone is gradually proving to be more vulnerable as time passes. We recommend that you always stay on your guard and protect yourself with the practical countermeasures. However for the latest reviews of tech and security products you can go to Reviewsed.com.

11
 Advanced issues found
1