The truth behind iOS security

Tags:
ipad malware antivirus security
Can anyone give me a non-biased opinion on the state of security for iPads? Just what might they be vulnerable to? Thanks

Software/Hardware used:
iPad
ASKED: August 8, 2012  9:03 PM

Answer Wiki

Thanks. We'll let you know when a new response is added.

As I understand the security on the iPad is pretty week.  There are a bunch of exploits which can be used to break into an iPad pretty easily via WiFi or Bluetooth.

The biggest weakness was just shown this week (read this) when hackers used someone’s iTunes account to remotely wipe their iPad.  I don’t know the specifics of how this person had everything setup, but I’m guessing that once the hacker was into their iTunes account it wouldn’t have been hard to get access to all the data on their iPad via the iCloud backup before wiping the iPad.

Discuss This Question: 3  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Yetanotherdamnscreenname
    Thanks for the response. I've heard from iPad users who insist it is bullet proof to stories like the one you just relayed and it's hard to know just where things stand. I need to determine how best to secure these devices in a coporate network with regards to sensitive data, malware, theft, etc.   Thanks again
    30 pointsBadges:
    report
  • TomLiotta
    Nothing is bullet-proof, but iPads can be significantly less troublesome than just about anything you want to compare with it.   As was repeated in the linked article above, the problems could have been almost totally avoided by the user with a couple pretty standard practices. In iPhone and iPad Security: The Human Element, we read "One aspect of the security problem hasn't changed at all -- security, or lack thereof, begins and ends with human behavior...". There's nothing new in that.   After that, we find "...overall BYOD security could be improved broadly both cheaply and quickly if companys were to implement and insist employees enable these three security measures: " Turn on auto-locking Turn on password protection Enable encryption That's from iPad, BYOD trend, raises IT security issues that can be easily fixed.   An obvious step is described in How to use Gmail's two-factor authentication to secure email on your iPad.   It's not completely clear if you're only concerned with iPads (and iPhones). Although popular, they're not actually at the top in usage. Consider the survey reported by ESET and Harris interactive (in the 'BYOD trend' link above) on 'the overall scale of the BYOD phenomenon'. More than 80 percent of employed adults use some kind of personally-owned electronic device for work-related functions.   The portion claimed by iPads and iPhones is a definite minority. ("Work-related" should not be interpreted as "used at work for work.")   For a good discussion on iOS security practices, see Securely Integrating iOS Devices into the Business Environment (PDF).   However, if you're looking for stuff also to cover everything other than iOS devices, you might need a lot more info. And no matter what, if you don't enforce practices, all bets are off.   Tom
    125,585 pointsBadges:
    report
  • TomLiotta
    I guess we'll have to wait to see if my previous comment makes it into this thread. At least it came out looking something close to the way I wanted it to look. Tom
    125,585 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following