Please enable JavaScript.
Coggle requires JavaScript to display documents.
iOS - Coggle Diagram
-
IOS Threat
-
WebKit Vulnerabilities
WebKits enable web browsers to correctly render web pages for a user. Attackers will exploit vulnerabilities in a Webkit to execute scripts of their own. They are commonly used by attackers as a springboard for the remote infection of the device.
To prevent malicious WebKit exploits:
- correlate activity with events on the device and network
- then stop any data being sent to the attacker.
-
Trustjacking
This new vulnerability called trustjacking exploits a convenient WiFi feature, which allows iOS device owners to manage their devices and access data, even when they are not in the same location anymore.
-
-
Malicious IOS Profiles
A user may be tricked into downloading a malicious profile and, by doing so, unknowingly provide the rogue configuration the ability to re-route all traffic from mobile device to an attacker-controlled server, further install rogue apps, and even decrypt communications
-
iOS Feature
-
-
-
HOMEKIT
home automation infrastructure that utilizes iCloud and iOS security to protect and synchronize private data without exposing it to Apple
-
-
-
-
-
-
-