In November of last year, we uncovered a major flaw in iOS we dubbed "Masque Attack" that allowed for malicious apps to replace existing, legitimate ones on an iOS device via SMS, email, or web browsing. In total, we have notified Apple of five security issues related to four kinds of Masque Attacks. Today, we are sharing Masque Attack II in the series – part of which has been fixed in the recent iOS 8.1.3 security content update.Read more...
Entries filed under 'Mobile Threats'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
January 20, 2015 3:10 PM By Vishwanath Raman, Yulong Zhang, Adrian Mettler, Malte Isberner | Mobile Threats
FireEye analyzed the most popular Android applications available in the Google Play store and found that a significant number of them do not encrypt sensitive data with strong cryptography, leaving them vulnerable to hackers.
November 10, 2014 12:00 PM By Hui Xue, Yulong Zhang, Tao Wei | Mobile Threats, Vulnerabilities, Threat Intelligence, Exploits, Targeted Attack
September 3, 2014 10:05 AM By Hitesh Dharmdasani | Mobile Threats
August 20, 2014 10:00 AM By Adrian Mettler, Yulong Zhang, Vishwanath Raman | Mobile Threats