{"id":1380,"date":"2010-01-29T16:55:32","date_gmt":"2010-01-29T15:55:32","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1380"},"modified":"2012-12-12T13:47:29","modified_gmt":"2012-12-12T21:47:29","slug":"how-secure-is-the-ipad","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/","title":{"rendered":"How Secure is the iPad?"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/ipad.jpg\"><\/p>\n<p>As the dust settles on the many reports that have focused on Apple&#8217;s iPad since its announcement on Wednesday, people are starting to think about the future of the device and how people are going to use it. One issue that comes to mind, for us at least, is the question of iPad security. Is the iPad secure? What are the security risks for the device?<\/p>\n<p>On the surface, the iPad is pretty much the same as the iPod touch or iPhone (without the built-in ability to make phone calls). It uses the same OS, and benefits from the same security features that the iPhone OS contains. One such feature is sandboxing, which Apple explains as follows:<\/p>\n<blockquote><p>\nIn iPhone OS, each application is put in a sandbox that restricts the application to using only its own files and preferences, and limits the system resources to which the application has access. For example, an application can call the public networking APIs to communicate over a network, but has no direct access to the communications or networking hardware.\n<\/p><\/blockquote>\n<p>The main issue for iPad security remains that of jailbreaking, or hacking the device to allow the user to install software not sold through the Apple Store. We saw, last year, a number of malware attacks on jailbroken iPhones (such as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-ransomware-dutch-hacker-exploits-jailbroken-iphone-bug-and-asks-for-money\/\">this<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/worm-affects-jailbroken-iphones-changes-wallpaper\/\">this<\/a>, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-iphone-worm-creates-botnet-copies-personal-data\/\">this<\/a>.) If users jailbreak the iPad, it will be just as susceptible to such attacks, though the wifi version will be less at risk because its range will be more limited.    <\/p>\n<p>For now, though, the iPad seems as secure as the iPhone, but we&#8217;ll know more when the device is released.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the dust settles on the many reports that have focused on Apple&#8217;s iPad since its announcement on Wednesday, people are starting to think about the future of the device and how people are going to use it. One issue that comes to mind, for us at least, is the question of iPad security. Is [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7],"tags":[3151,8],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"As the dust settles on the many reports that have focused on Apple&#039;s iPad since its announcement on Wednesday, people are starting to think about the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Secure is the iPad?  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"As the dust settles on the many reports that have focused on Apple&#039;s iPad since its announcement on Wednesday, people are starting to think about the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-01-29T15:55:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-12-12T21:47:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/ipad.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/ipad.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/ipad.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/\",\"name\":\"How Secure is the iPad? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#primaryimage\"},\"datePublished\":\"2010-01-29T15:55:32+00:00\",\"dateModified\":\"2012-12-12T21:47:29+00:00\",\"description\":\"As the dust settles on the many reports that have focused on Apple's iPad since its announcement on Wednesday, people are starting to think about the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Secure is the iPad?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"How Secure is the iPad?\",\"datePublished\":\"2010-01-29T15:55:32+00:00\",\"dateModified\":\"2012-12-12T21:47:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#webpage\"},\"wordCount\":276,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/ipad.jpg\",\"keywords\":[\"Apple\",\"iPad\"],\"articleSection\":[\"Apple\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"As the dust settles on the many reports that have focused on Apple's iPad since its announcement on Wednesday, people are starting to think about the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/","og_locale":"en_US","og_type":"article","og_title":"How Secure is the iPad?  - The Mac Security Blog","og_description":"As the dust settles on the many reports that have focused on Apple's iPad since its announcement on Wednesday, people are starting to think about the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-01-29T15:55:32+00:00","article_modified_time":"2012-12-12T21:47:29+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/ipad.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/ipad.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/ipad.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/","name":"How Secure is the iPad? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#primaryimage"},"datePublished":"2010-01-29T15:55:32+00:00","dateModified":"2012-12-12T21:47:29+00:00","description":"As the dust settles on the many reports that have focused on Apple's iPad since its announcement on Wednesday, people are starting to think about the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How Secure is the iPad?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"How Secure is the iPad?","datePublished":"2010-01-29T15:55:32+00:00","dateModified":"2012-12-12T21:47:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#webpage"},"wordCount":276,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-secure-is-the-ipad\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/ipad.jpg","keywords":["Apple","iPad"],"articleSection":["Apple"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-mg","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1380"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1380"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1380\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}