physfluids.fr
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
willya@lemmyf.uk to Apple@lemmy.mlEnglish · 1 year ago

First ever iOS trojan discovered — and it’s stealing Face ID data to break into bank accounts

www.tomsguide.com

external-link
message-square
48
fedilink
56
external-link

First ever iOS trojan discovered — and it’s stealing Face ID data to break into bank accounts

www.tomsguide.com

willya@lemmyf.uk to Apple@lemmy.mlEnglish · 1 year ago
message-square
48
fedilink
What you need to know about the dangerous Android banking trojan that's been ported to iPhone
  • willya@lemmyf.ukOP
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    1
    ·
    edit-2
    1 year ago

    That’s not true. A Trojan is a virus disguised as something else to trick your victim. Am I the only one that messed with their friends with ones like sub7 and stuff like 30 years ago? Lol

    • TheAnonymouseJoker@lemmy.ml
      link
      fedilink
      arrow-up
      2
      arrow-down
      4
      ·
      1 year ago

      No, he is correct. A program is only similar to (not equal to) a trojan if it is a corporate MDM installed, knowing the risks, since it is not intentionally corrupting files or causing harm. Spyware, yes, but not trojan.

      • willya@lemmyf.ukOP
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        edit-2
        1 year ago

        No, they’re wrong. They were wrong as soon as they said a Trojan you have to install yourself, which is exactly how it works. It can’t work if you weren’t tricked into installing it. The Trojan doesn’t have to cause harm it’s called a Trojan based on the way it has to be deployed.

        • mbirth@lemmy.mbirth.uk
          link
          fedilink
          arrow-up
          1
          arrow-down
          2
          ·
          1 year ago

          Let’s phrase it differently: Those who blindly install some MDM profile deserve everything that happens after.

          • willya@lemmyf.ukOP
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 year ago

            I agree, but it was initially snuck on through TestFlight.

        • TheAnonymouseJoker@lemmy.ml
          link
          fedilink
          arrow-up
          1
          arrow-down
          3
          ·
          edit-2
          1 year ago

          Similar characteristics does not define a virus type. You are confidently incorrect. Please learn the difference between Trojan and MDM.

          https://www.kaspersky.co.in/resource-center/threats/trojans

          https://www.malwarebytes.com/cybersecurity/business/what-is-mobile-device-management-mdm

          https://www.bleepingcomputer.com/news/security/hackers-breach-company-s-mdm-server-to-spread-android-malware/

          People will slap the shit out of you on a malware/security forum if you told them this. Behaviour upon execution is a proper determinant rather than deployment method. It is why heuristics and real world execution sandboxes are utilised by security firms.

          • willya@lemmyf.ukOP
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            edit-2
            1 year ago

            It was initially launched through TestFlight you’re conflating two ways it was distributed to just try to call me an idiot. I’m assuming you don’t even know what TestFlight is.

            • TheAnonymouseJoker@lemmy.ml
              link
              fedilink
              arrow-up
              1
              arrow-down
              2
              ·
              1 year ago

              You are the only educated one about Apple software development in this world. We are all idiots.

              I have no interest in playing with chess pigeons. Have a good day.

Apple@lemmy.ml

apple@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !apple@lemmy.ml

Here you can talk about Apple’s ecosystem, Apple’s OSs (Operating Systems), Apple’s apps, Apple’s everything!!

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1 user / day
  • 12 users / week
  • 173 users / month
  • 225 users / 6 months
  • 1 local subscriber
  • 5.18K subscribers
  • 159 Posts
  • 566 Comments
  • Modlog
  • mods:
  • LucasDondo@lemmy.ml
  • BE: 0.19.4
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org