{"id":921,"date":"2016-12-05T20:19:33","date_gmt":"2016-12-05T20:19:33","guid":{"rendered":"https:\/\/www.technology-solved.com\/huntsville-al\/?p=921"},"modified":"2022-02-02T21:27:10","modified_gmt":"2022-02-02T21:27:10","slug":"mobile-users-running-old-ios-versions-vulnerable-fake-apps","status":"publish","type":"post","link":"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/","title":{"rendered":"Mobile Users Running Old IOS Versions Vulnerable To Fake Apps"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-920\" src=\"\/huntsville-al\/wp-content\/uploads\/sites\/13\/2016\/12\/MobileXUsers.jpg\" alt=\"iPhone\" width=\"300\" height=\"225\" \/><br \/>\nBack in the good ol\u2019 days before the rise of the iPhone, Apple devices were largely considered to be more secure than their Wintel counterparts. There was a time when Apple used this as a major plank in their marketing efforts. These days, it is increasingly clear that that\u2019s no longer the case.<\/p>\n<p>A recent TrendMicro survey of Apple Apps offered by third party marketplaces has discovered that the ecosystem is infested with a variety of malware.<\/p>\n<p>The most common method of infection is spoofing Bundle IDs. Hackers can make fake copies of popular apps, inject whatever malicious code they want, give them a Bundle ID that will pass iOS inspection, and ride the wave of app popularity to get downloads and installs.<\/p>\n<p>Fortunately, anyone running iOS 10 is safe from this type of attack. The problem, of course, is that not everyone is running the latest version of the OS.<\/p>\n<p>This presents enormous challenges for small to medium sized business owners, especially if your company has a BYOD policy. It\u2019s all too easy to envision a scenario in which a poisoned app on one of your employees\u2019 devices proves to be the back door that allows a hacker access to your company\u2019s data.<\/p>\n<p>With proper security protocols in place, the risk of such an occurrence can be minimized, but it can never be completely eliminated.<\/p>\n<p>What\u2019s the current state of your digital security and your policy on employee devices? If you\u2019re worried that either (or both) might need to be shored up, but aren\u2019t sure how to proceed, give us a call. One of our talented team members will be happy to work with you to assess your current situation. We can work with you to design a more robust and security digital security system that minimizes your risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Back in the good ol\u2019 days before the rise of the iPhone, Apple devices were largely considered to be more secure than their Wintel counterparts. There was a time when Apple used this as a major plank in their marketing efforts. These days, it is increasingly clear that that\u2019s no longer the case. A recent [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":2023,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-921","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Users Running Old IOS Versions Vulnerable To Fake Apps - Computer Troubleshooters Huntsville<\/title>\n<meta name=\"description\" content=\"Back in the good ol\u2019 days before the rise of the iPhone, Apple devices were largely considered to be more secure than their Wintel counterparts. There was\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Users Running Old IOS Versions Vulnerable To Fake Apps - Computer Troubleshooters Huntsville\" \/>\n<meta property=\"og:description\" content=\"Back in the good ol\u2019 days before the rise of the iPhone, Apple devices were largely considered to be more secure than their Wintel counterparts. There was\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Troubleshooters Huntsville\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-05T20:19:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-02T21:27:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2016\/12\/MobileXUsers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"225\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cthuntsville\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cthuntsville\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\\\/\"},\"author\":{\"name\":\"cthuntsville\",\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/#\\\/schema\\\/person\\\/1141e403df8721a619d7e354767b4e90\"},\"headline\":\"Mobile Users Running Old IOS Versions Vulnerable To Fake Apps\",\"datePublished\":\"2016-12-05T20:19:33+00:00\",\"dateModified\":\"2022-02-02T21:27:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\\\/\"},\"wordCount\":315,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2016\\\/12\\\/MobileXUsers.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\\\/\",\"url\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\\\/\",\"name\":\"Mobile Users Running Old IOS Versions Vulnerable To Fake Apps - Computer Troubleshooters Huntsville\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2016\\\/12\\\/MobileXUsers.jpg\",\"datePublished\":\"2016-12-05T20:19:33+00:00\",\"dateModified\":\"2022-02-02T21:27:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/#\\\/schema\\\/person\\\/1141e403df8721a619d7e354767b4e90\"},\"description\":\"Back in the good ol\u2019 days before the rise of the iPhone, Apple devices were largely considered to be more secure than their Wintel counterparts. There was\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2016\\\/12\\\/MobileXUsers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2016\\\/12\\\/MobileXUsers.jpg\",\"width\":300,\"height\":225,\"caption\":\"iPhone\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Locations\",\"item\":\"https:\\\/\\\/www.technology-solved.com\\\/locations\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alabama\",\"item\":\"https:\\\/\\\/www.technology-solved.com\\\/alabama-state\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Mobile Users Running Old IOS Versions Vulnerable To Fake Apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/#website\",\"url\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/\",\"name\":\"Computer Troubleshooters Huntsville\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/#\\\/schema\\\/person\\\/1141e403df8721a619d7e354767b4e90\",\"name\":\"cthuntsville\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g\",\"caption\":\"cthuntsville\"},\"url\":\"https:\\\/\\\/www.technology-solved.com\\\/huntsville-al\\\/author\\\/cthuntsville\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Users Running Old IOS Versions Vulnerable To Fake Apps - Computer Troubleshooters Huntsville","description":"Back in the good ol\u2019 days before the rise of the iPhone, Apple devices were largely considered to be more secure than their Wintel counterparts. There was","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"Mobile Users Running Old IOS Versions Vulnerable To Fake Apps - Computer Troubleshooters Huntsville","og_description":"Back in the good ol\u2019 days before the rise of the iPhone, Apple devices were largely considered to be more secure than their Wintel counterparts. There was","og_url":"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/","og_site_name":"Computer Troubleshooters Huntsville","article_published_time":"2016-12-05T20:19:33+00:00","article_modified_time":"2022-02-02T21:27:10+00:00","og_image":[{"width":300,"height":225,"url":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2016\/12\/MobileXUsers.jpg","type":"image\/jpeg"}],"author":"cthuntsville","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cthuntsville","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/#article","isPartOf":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/"},"author":{"name":"cthuntsville","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90"},"headline":"Mobile Users Running Old IOS Versions Vulnerable To Fake Apps","datePublished":"2016-12-05T20:19:33+00:00","dateModified":"2022-02-02T21:27:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/"},"wordCount":315,"commentCount":0,"image":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2016\/12\/MobileXUsers.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/","url":"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/","name":"Mobile Users Running Old IOS Versions Vulnerable To Fake Apps - Computer Troubleshooters Huntsville","isPartOf":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/#primaryimage"},"image":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2016\/12\/MobileXUsers.jpg","datePublished":"2016-12-05T20:19:33+00:00","dateModified":"2022-02-02T21:27:10+00:00","author":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90"},"description":"Back in the good ol\u2019 days before the rise of the iPhone, Apple devices were largely considered to be more secure than their Wintel counterparts. There was","breadcrumb":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/#primaryimage","url":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2016\/12\/MobileXUsers.jpg","contentUrl":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2016\/12\/MobileXUsers.jpg","width":300,"height":225,"caption":"iPhone"},{"@type":"BreadcrumbList","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/mobile-users-running-old-ios-versions-vulnerable-fake-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Locations","item":"https:\/\/www.technology-solved.com\/locations\/"},{"@type":"ListItem","position":2,"name":"Alabama","item":"https:\/\/www.technology-solved.com\/alabama-state\/"},{"@type":"ListItem","position":3,"name":"Homepage","item":"https:\/\/www.technology-solved.com\/huntsville-al\/"},{"@type":"ListItem","position":4,"name":"Mobile Users Running Old IOS Versions Vulnerable To Fake Apps"}]},{"@type":"WebSite","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#website","url":"https:\/\/www.technology-solved.com\/huntsville-al\/","name":"Computer Troubleshooters Huntsville","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.technology-solved.com\/huntsville-al\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90","name":"cthuntsville","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g","caption":"cthuntsville"},"url":"https:\/\/www.technology-solved.com\/huntsville-al\/author\/cthuntsville\/"}]}},"_links":{"self":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/comments?post=921"}],"version-history":[{"count":4,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/921\/revisions"}],"predecessor-version":[{"id":2380,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/921\/revisions\/2380"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/media\/2023"}],"wp:attachment":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/media?parent=921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/categories?post=921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/tags?post=921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}