{"id":8747,"date":"2015-05-05T05:00:56","date_gmt":"2015-05-05T12:00:56","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8747"},"modified":"2015-05-04T13:40:51","modified_gmt":"2015-05-04T20:40:51","slug":"revealing-secrets-advances-android-ios-attacks","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/05\/revealing-secrets-advances-android-ios-attacks\/","title":{"rendered":"Revealing the Secrets: Advances in Android and iOS Attacks"},"content":{"rendered":"<p>In recent months, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/unit42\/\" target=\"_blank\">Unit 42<\/a>, the cyber threat intelligence team at Palo Alto Networks, has encountered several game-changing advances in mobile malware for both iOS and Android. For example, <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/11\/wirelurker-new-era-os-x-ios-malware\/\" target=\"_blank\">WireLurker<\/a> employed a multistage infection that exploited non-jailbroken iPhones. These techniques indicate an increase in sophistication and signify a shift in the way we think about mobile security.<!--more--><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/webcasts\/advances-mobile-attacks.html\" target=\"_blank\">This webcast<\/a>, hosted by <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/brian\/\" target=\"_blank\">Brian Tokuyoshi<\/a>, discusses the capabilities of several new families of mobile\u00a0malware, the methods used to reach victims, and strategies to mitigate exposure to risk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent months, Unit 42, the cyber threat intelligence team at Palo Alto Networks, has encountered several game-changing advances in mobile malware for both iOS and Android. For example, WireLurker employed a &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[131,76],"tags":[172,592,1164,414,97,872],"coauthors":[716],"class_list":["post-8747","post","type-post","status-publish","format-standard","hentry","category-malware-2","category-mobility","tag-android","tag-ios","tag-iphones","tag-mobile-security","tag-webinar","tag-wirelurker"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8747","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8747"}],"version-history":[{"count":2,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8747\/revisions"}],"predecessor-version":[{"id":9009,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8747\/revisions\/9009"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8747"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8747"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}