Skip to comments.iOS Does Exist — (list of ALL the existing iOS malware to date)
Posted on 06/17/2014 12:37:31 AM PDT by Swordmaker
With our FortiGuard Labs reporting that 96.5% of all mobile malware is Android based it would be easy to see why someone might opt for an iPhone. But, users beware. Don’t write off iOS as the secure alternative to Android just yet! Despite, Android malware being nearly an epidemic, or as Tim Cook referenced, “a toxic hellstew”, iOS is not immune.
Before somebody asks me (again) whether there are any iOS malware or not, I decided to consolidate the information for you. Hope this helps you, and keeps your (i-) phones secure :)
(I have marked the malware that might have at one time in the past infected an un-jailbroken iPhone iPod touch, or iPad in redSwordmaker)
|Name||Discovery date||Presumed origin||iOS Devices||Type|
|iOS/Trapsms.A!tr.spy||June 2009||Russia?||Jailbroken||SMS Forwarder|
|iOS/Eeki.A!worm||Nov 2009||Australia (Ashley Towns)||Jailbroken||Worm Proof of Concept|
|iOS/Eeki.B!worm||Nov 2009||The Netherlands||Jailbroken||Mobile banking malware|
|iOS/Toires.A!tr.spy||Nov 2009||Switzerland (Nicolas Seriot)||Any (jailbroken or not)||Rogue application - Proof Of Concept|
|Adware/LBTM!iOS||Sep 2010||France||Any (jailbroken or not) - Was found (and removed) in the official AppStore||Call premium phone number|
|Spy/iKeyGuard!iPhoneOS||Apr 2011||Czech Rep.||Jailbroken||Keylogger|
|iOS/FindCall.A!tr.spy||July 2012||Russia?||Any (jailbroken or not) - Was found (and removed) in the official AppStore||Privacy trojan|
|iOS/AdThief.A!tr||Mar 2014||China||Jailbroken||Ad revenue hijacking|
|iOS/SSLCreds.A!tr.pws||Apr 2014||China||Jailbroken||Password stealer|
– the Crypto Girl
PLEASE NOTE! THIS DATA COMES FROM A COMPUTER SECURITY COMPANY THAT IS, OF COURSE, INTERESTED IN SELLING ITS SECURITY PRODUCT. DO NOT BUY. THIS WAS POSTED PURELY FOR THE DATA INTEREST.
To remove any malware from an iPhone simply delete the app. . . or restore the iOS device to factory settings and re-download your free and purchased apps. . . or/and restore your iDevice from your computer except for the offending app. If you have backed up your iDevice to the cloud, your data will be restored automatically. Apps need to be redownloaded.
Ping for the tech list
Why anybody would jailbreak there devise is beyond me.
Two that are known. The malware typically is out there for awhile before it is detected and removed.
I think your odds of getting malware on an iPhone are pretty slim, even slimmer on a Windows Phone.
Android is another matter.
If you want on or off the Mac Ping List, Freepmail me.
True to both statements. However, with the curated Apple App store, finding any malicious app is much easier than in the Android world. . . and getting one on the store has become far harder than it was even two years ago when the last one was snuck in. . . which lasted all of two days before it was discovered.
Windows Phone 8 has far fewer developers (most of which Microsoft is paying) and while they are emulating Apple's curated app store approach, it remains to be seen if they will be as good at it, coming out of an "open" Windows environment. I think they have learned their lesson. Their previous attempts suffered from malware attacks. Right now, so far, there has only been one of proof of concept that was viable for Windows Phone 8. However, in fair turn-about, since Microsoft has only about 3% of the smartphone market, they can be truly be said to be protected by "Security by Obscurity." GRIN.
Putting my ignorance on display...what is the meaning of jailbroken?
The sight has an explanation. You'll see it their.
Apple is blowing it. My sister wanted a smartFone but found it too hard to read the internet on the normal size ones ones. She got a Samsung Note 3 w 5.7” screen and is very happy. Women can put these in their handbags. Obviously...no iPhone option for this size. Apple loses out.
Jailbroken - means someone has taken some means to partially boot a device (iPhone in this case) and has inserted a piece of software that bypasses the intended function of the Operating System.
This bypass can be used to activate features that are not included in your cellphone plan (such as hotspotting) or adding “features” that are not included in your normal iOS (such as alternative fonts, pirated software, or other such personal “tweak” you may want (such as customized display when your phone is locked).
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.