<img src="https://secure.leadforensics.com/23986.png" style="display:none;">
Skip to the main content.

1 min read

Is your iPhone safe from hackers?

A security expert has identified a ‘backdoor’ for hackers to attack your iPhone through dozens of popular apps. Will Strafach, CEO of Sudo Security Group warned that many iOS apps were at risk of silent interception of data that should otherwise be protected.

The vulnerability is exposed when users send data from their iPhone to the cloud via Wi-Fi. Apps identified to be at risk include banking apps, messenger apps and music apps, among others. With security of financial information and medical details known to be compromised.

Mr Strafach said the security hole ‘is derived from networking-related code within iOS applications being misconfigured in a highly unfortunate manner’ and due to the type of flaw, Apple would make other apps more vulnerable to attacks if they were to issue a widespread fix. Therefore, there is little Apple can do to address the problem. The onus is therefore placed on the shoulders of the app developers themselves, to ensure their apps are not at risk of being hacked.

The vulnerability is exposed mainly when the users phone is connected to Wi-Fi, therefore it is best to avoid public Wi-Fi wherever possible. If you are in a public area and need to access sensitive information such as banking apps or online accounts, switch your Wi-Fi off and use your cellular data instead. 

In a previous blog, we talk about whether ‘Location tracking’ was putting you at risk and suggested some tips on how to protect yourself. Some of these are relevant to this situation and will help you keep your iPhone and your personal information safe:

  • Avoid using unencrypted public Wi-Fi where possible. Fake Wi-Fi networks can be designed to look like the real thing, but they’re actually operated by hackers. Connecting to these networks can allow hackers to intercept emails, texts or calls, or direct you to places on the web where they can obtain sensitive passwords and other information.
  • Delete all the apps you don’t use
  • Disable permissions that the apps doesn’t require in order to function
  • Read privacy policies closely
  • Check where companies are based, if they are in malware hotspots, consider whether having the app is worth its potential risks
  • Make sure you have a lock on your phone so that no one can download an app without your knowledge

For a full list of apps confirmed to be vulnerable, visit Mr Strafach’s blog post  > here <

Free Workshop – Protect Your Business From Cyber Threats

Venue: Fitzrovia IT, 29-30 Fitzroy Square, London, W1T 6LQ Date: Thursday 15th June 2017 Time: 8.00am for an 8.30am start – free breakfast will be...

Read More
3 Reasons Why You Need to Keep Your IT Systems Updated

3 Reasons Why You Need to Keep Your IT Systems Updated

In a period of heightened awareness around the importance of maintaining strong cybersecurity practices, it feels essential to highlight one of the...

Read More

How To Protect Your Business From Hacking

There has been some recent coverage in the press about the activities of a hacking group dubbed APT10. This group are widely believed to be based in...

Read More