Premium Resources
Free Resources
IOS
IOS uses proprietary software. The attacks on these phones are limited since they are not open source systems.
Image Source: https://intellipaat.com/tutorial/ios-tutorial/ios-architecture/
Types of IOS Attacks:
Jailbreaking:
Jailbreaking may put the device at risk. It is done to gain administrative privileges and to download third-party application extensions, etc. Though, the device may lose its warranty, get infected with malware, drop in performance, etc. There are three ways jailbreaking can be done-
Tethered:
After a device is jailbroken, it will no longer have a patched kernel; it might go to a partially functioning state and requires re-jailbreaking using the same computer.
Semi-tethered:
When the device is turned off and on, it will no longer be jailbroken. The device can be used for normal functions.
Untethered:
The device once jailbroken remains jailbroken, and the kernel will be patched completely after reboot.
Countermeasures:
-
Do not jailbreak the device.
-
Apply strong encryption.
-
Always connect to safe networks.
-
Follow common security guidelines.
-
Do not open links/attachments from unknown sources.