A number of experts believe that spreading of virus and malware are rather difficult under iOS for the closed system design which every apps are executed in their own sandboxes
Does iPhone need Antivirus software?
A number of experts believe that spreading of virus and malware are rather difficult under iOS for the closed system design which every apps are executed in their own sandboxes – independent virtual environments that seclude the apps, keeping them away from other apps’ data.
However, it is reported last year that the Israeli NSO Group developed a spyware named Pegasus that can invade Apple’s iOS, capable of reading text messages, photos and contacts, even zero-click remote accessing the target device’s microphone and camera. Media said French president Emmanuel Macron, Prime Minister of Pakistan and journalists from all around the globe were on the target list of the spyware.
Is the general public safe?
No always. Recently, information security company ZecOps has developed an attack technique, dubbed NoReboot, to stimulate shutdown for monitoring the user’s camera and microphone. The team injects malicious codes to the smartphone, fakes shutdown and reboot screen, to trick a user into thinking that the phone has been powered off, but in fact, it is still running, and the hacker could potentially spy on a user with the camera and microphone.
To protect iPhone from malware, remember the following tips:
Don’t jailbreak. Jailbreaking may remove the app permissions. Jailbreaking software may also include malware
Download apps only from official channel (i.e. App Store)
Install anti-malware software tools
Think before you connect to public Wifi or click suspicious links
Be careful when accepting app permissions, especially the access to contact list, camera, location, etc.
Always update iOS to the latest version
You may be interested in
A Vulnerability Disclosure Program (VDP) is a process by which an organization invites external security researchers to report vulnerabilities in…
Suspected Scam / Cyber Pitfall? Check it out with “Scameter”! Please Select Type Platform Username Platform ID Phone Email URL…
Recovery phrase is a list of words randomly generated by your crypto wallet (e.g. MetaMask) during initial account setup. Recovery…
How to set up a Firewall A firewall helps defend against cyber attacks and data breaches through shielding computer or…
You may have received new mobile phone as a present. After excitingly transferring data to your new mobile How to…
Cyber Security and Technology Crime Bureau, initiated a new wave of cyber hygiene operation to improve online security, maintain system…
Free Wi-Fi is provided in public places such as government public facilities, shopping malls Free Public Wi-Fi Free Wi-Fi is…
Social media and instant messaging software have become essential tools for our daily social interaction Security of Social Media Account…
If you want to protect your computer facilities and smart devices from cyber threats, please download relevant tools via the…
Multi-Factor Authentication (MFA) is to use two or more factors to authenticate Multi-Factor Authentication and Biometric Authentication Importance of Multi-Factor…
In late 2022, a virtual private network service provider published a list of the most commonly used passwords, “password” topped…