In November of last year, we uncovered a major flaw in iOS we dubbed "Masque Attack" that allowed for malicious apps to replace existing, legitimate ones on an iOS device via SMS, email, or web browsing. In total, we have notified Apple of five security issues related to four kinds of Masque Attacks. Today, we are sharing Masque Attack II in the series – part of which has been fixed in the recent iOS 8.1.3 security content update.Read more...
Entries filed under 'Mobile Threats'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
January 20, 2015 3:10 PM By Vishwanath Raman, Yulong Zhang, Adrian Mettler, Malte Isberner | Mobile Threats, Threat Research
FireEye analyzed the most popular Android applications available in the Google Play store and found that a significant number of them do not encrypt sensitive data with strong cryptography, leaving them vulnerable to hackers.
November 10, 2014 12:00 PM By Hui Xue, Yulong Zhang, Tao Wei | Mobile Threats, Vulnerabilities, Threat Intelligence, Threat Research, Exploits, Targeted Attack
September 3, 2014 10:05 AM By Hitesh Dharmdasani | Mobile Threats, Threat Research
August 20, 2014 10:00 AM By Adrian Mettler, Yulong Zhang, Vishwanath Raman | Mobile Threats, Threat Research