The U.S. Government’s Computer Emergency Readiness Team (US-CERT) has posted an official alert regarding the iOS Masque Attack disclosed earlier this week. The notice summarizes the vulnerability, specifically noting that the vulnerability works “under a limited set of circumstances” and that “in order for the attack to succeed, a user must install an untrusted app, such as one delivered through a phishing link.” The bulletin goes on to reiterate the solutions provided by the original report: specifically that users should not install apps from sources other than Apple’s App Store or their own enterprise organization, should never click install from an app pop-up that appears on a web page, and if iOS shows an “Untrusted App Developer” alert, click on “Don’t Trust” and remove the app.
Latest News
- Spotify to overtake Apple Podcasts, suggests report
- Expand your laptop’s I/O with the Brydge Stone II USB-C Multiport Hub, now 20% Off
- Apple Aims to Create ‘Magical’ Content on Fitness+
- Ray Liotta returns to acting in Apple TV+ ‘In With The Devil’ series
- 3rd beta of watchOS 7.4 released to testers
- Apple granted patent for Lightning port replacement
- iPhone 13 Pro: 120Hz LTPO Display and smaller notch
- Apple may launch foldable iPhone in 2023: Kuo
- Apple TV+ drama series “The Mosquito Coast” to release on April 30
- Apple to release OLED iPad Pro & OLED 16″ MacBook Pro next year