Tag Archives: Apple

Diagnosing a Phishing Attack

I was clearing out some older emails today and encountered an attempt to phish Apple credentials; although this one was specific to Apple, the general lessons apply to all phishing attacks ‚Ķ and indeed more general malicious spam. The attack … Continue reading

Posted in Active Attacks, Email | Tagged , | Comments Off on Diagnosing a Phishing Attack

The Xcode Ghost In Your Apps

We are seeing a number of instances where people have installed¬†legitimate applications from the Apple App store, and their phone is communicating with the Xcode Ghost malware infrastructure across the network. This sort of malware infection is a bit unusual … Continue reading

Posted in Malware, Technical | Tagged , , , , , | Comments Off on The Xcode Ghost In Your Apps