iPhone worm: There isn't an app for that

Filed Under: Android, Apple, BlackBerry, Malware, Mobile

"Guest blogger Michael Argast, director of global sales engineering at Sophos, wondered why there aren't any security applications for iPhone. Michael has an iPhone that is not jail broken."


Michael Argast

The recent worm that is infecting jail broken iPhones is highlighting the risk of playing outside of Apple's walled garden. Once you pwn your phone, you're on your own from a security perspective. This is a broader problem than just jail-breaking however; Apple has yet to provide businesses tools that allow them to manage security centrally, which leaves the administrators at many Fortune 100 companies ill prepared to proactively secure or deal with threats as they arise.

As Chet mentioned to me, many with iPhones at work tend to treat the devices like personal property - even jail-breaking them. Sure, all this particular worm did was rickroll the device, but the next may well steal confidential data - and the company has no way of knowing the device was even vulnerable.

To be ready for enterprises Apple must provide a suite of tools to ensure security policies are adhered to. For example, RIM provides the ability to centrally administer, monitor, update, delete, encrypt, and configure security settings through their BlackBerry Enterprise Server software.

Unhappy iPhone

Mobile security is still an evolving space. Android, with a more open development platform, may allow for more traditional security offerings (although balancing security and performance on these devices will be an interesting challenge) and the ability to run multiple applications at once will allow for more real time protection against new threats. Apple, inside the walled garden is relatively secure from malware - although there have been apps which have made it through the app screening process only to steal confidential data.

This is a rapidly evolving space, and it is critical that phone vendors work with the security community to prevent these ubiquitous devices from becoming gaping holes.

Creative Commons iPhone image courtesy of Nuels van Eck's flickr photostream.
Creative Commons unhappy Mac image courtesy of Ethan Hein's flickr photostream.

Update: It has been brought to our attention that Apple does in fact provide tools for managing iPhone usage in the enterprise. We will post a follow up article detailing the capabilities. For more information please see http://www.apple.com/support/iphone/enterprise.

, , , , ,

You might like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Chester Wisniewski is a Senior Security Advisor at Sophos Canada. He provides advice and insight into the latest threats for security and IT professionals with the goal of providing clear guidance on complex topics. You can follow Chester on Twitter as @chetwisniewski, on App.net as Chester, Chester Wisniewski on Google Plus or send him an email at chesterw@sophos.com.