iOS 8.1.3 partially blocks a dangerous exploit

  iOS 8.1.3 was launched at the end of last month by the company Apple Lossless Audio CODEC (ALAC), and in case you didn't know this, it blocks the game an extremely dangerous exploit discovered in November 2014 and called Masque Attack. This exploit for iOS 8 it allowed hackers to trick us into stealing our data, more precisely they could clone the interface of an application with an interface that transmitted login data to their servers. This interface was open instead of the original application installed in our terminals, but everything was based on the user's interaction with the hackers' software, so the infection was not simple.

  In iOS 8.1.3 the Apple company partially solved the vulnerability exploited by hackers, so that before opening an infected application, the operating system asks us if we are sure we want to do this. Basically, iOS tells us that that application comes from an untrustworthy developer and asks us if we want to run the software or not, this being the first warning sign. Before launch iOS 8.1.3 this warning was displayed only at the time of the initial infection, but the Apple company modified the functionality of iOS to display the alert also when the infected application is opened.

  What Apple hasn't done is modify the URL system of iOS 8.1.3 to completely prevent app infection and user interface replacement, but this will probably be done in the future. Now called Masque Attack II, the exploit is much more difficult to use in our iDevices, but its existence remains a big problem for the Apple company and its iDevices, especially those in the corporate environment. In the two video clips in this article, you have shown how our terminals running iOS 8.1.3 can be infected and exploited, so you will know why you have to be careful when you click on unknown links.