Attackers can compromise your iPhone through chargers and
apps
Researchers from the Georgia Tech Information Security
Center (GTISC) have discovered two security weaknesses that permit installation
of malware onto Apple mobile devices using seemingly innocuous applications and
peripherals, uncovering significant security threats to the iOS platform.
“Apple utilizes a mandatory app review process to ensure
that only approved apps can run on iOS devices, which allows users to feel safe
when using any iOS app,” said GTISC Associate Director Paul Royal, also a
research scientist in the College of Computing. “However, we have discovered
two weaknesses that allow circumvention of Apple’s security measures.”