Thursday

New iPhone Malwares Questions Apple’s Security Claim

...

What makes this a more exciting piece of news; Android spyware wreaking havoc with OS phones or iPhone spyware infiltrating the ‘so secured’ platform of the Apple device? Surely, the later grabs your attention, as this is definitely not something one would normally expect. The iOS is considered as the foolproof and highly secured platform, which has increased the expectations of not only its users, but also the security and tech gurus. So, cavity in this fortress is a waking call for the Apple’s masters, especially in face of a latest malware scare.


iphone Malware

The Dirty Fish

Lately, news published in Bloomberg make huge waves in the sea of technological world – a malware, known as FinFisher spyware, developed by Gamma Group from the UK, and is being touted as spyware that can take over many mobile devices, iPhone and BlackBerry included. The malware will prove to be a fish that contaminates the entire aquarium, leaving nothing as it spreads. It has the ability to work as an iPhone tracking software or BlackBerry spyware – working stealthily to keep a track of the location of the phones, their voice calls and emails. Unlike any other tracking software, FinFisher records your voice calls by turning the microphone on and even the surrounding sounds.
Basically function of this spyware is to monitor the target user’s privacy - from their movement, their private data, their personal dealings, anything and everything would be under this demon’s gun.

Fishing In Deep Waters

Researchers from the University of Toronto’s Munk School of Global Affairs have been struggling to find how deep this Fisher spyware can swim. Samples collected of devices affected from this malware are under analysis at the Citizen Lab to unravel the myriad layers of this spy. Researchers have so far revealed that there are many people using this spyware to monitor targets – allowing the users to switch the microphone of the targeted phone remotely and convert an average iPhone into a proper tracking device.
The University’s research results are similar to the material that Gamma has been spreading around to promote the FinFisher product called FinSpy Mobile. FinFisher has the ability to monitor computer and cell phone in a stealth mode.

Privacy On Target

This spyware not only monitors your saved data or your calls, but also saves every word that you type through your smartphone keyboard. A keystroke logger logs every singly key that is typed on a keyboard onto the hacker’s screen through the internet and hence both the passwords of your social networking or email accounts, and your bank accounts would be hacked through the FinSpy products.
Similarly remotely turning on cameras on an iPhone – or a BlackBerry for that matter, with a quintessential BlackBerry spyware maneuver – can jeopardize the privacy of the user, and would aid the hacker in keeping tabs on their target in a multitude of ways. And also, there are few better ways of intruding in on the private dealings of a person than intercepting their Skype calls – it could lead to privacy repercussions of both the personal and business fronts.

...



Why Not Share This Post? It Takes Just A Second!!


Author: Edi Dominic Ifediri

Best described as a geek with a mixture of skills in drawing comics, Content-Writing, Computing and Mobile technology, this was due to his passion for Arts and Sciences since the age of 14 that he kicked off with the mobile web. He is the Founder/Chief-Editor at EdiTweaks which had almost been noticed as one of Nigeria's Best Tech blogs
You can add me on Facebook., follow my updates on Twitter or your Connections on LinkedIn
By the way, if your website/blog needs some tweaking, custom design or Optimization, you can Contact me here

Come on, hit us with a Comment. Love to hear what you think!

3 comments:

  1. who creates the malware and why?

    ReplyDelete
  2. Researchers create malwares, and I think they do this to test how strong Iphone Devices prove to be.
    So the Best thing for the Apple company to do is improve the devices security systems once such loopholes have been unleashed.
    Hope that answers your question.

    ReplyDelete
  3. This is just another case of our privacy being used against us. cell phone tracking are like our own biographers, agreed and should never be allowed to be used in this manner, unless its for a serious crime, rape, murder, child abductions...but for the sake of what the Feds and local LEO's are wanting to do is just not right, and should be stopped.

    ReplyDelete


Your Comments are Welcome.
You can Use Google Account To Leave a Comment, if You don't have a Google Account, You can add only Your Name, Click COMMENT AS >> Select NAME/URL >> Put your Name, (Leave URL empty if you don't have a website) >> then Write Your Comment in the Comment box and click Publish.

If you're here to Spam, Sorry, it won't work.

Let's enjoy and have a Reasonable conversation.
Thank You.