{"id":40648,"date":"2015-04-22T09:57:22","date_gmt":"2015-04-22T16:57:22","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=40648"},"modified":"2016-10-07T11:26:58","modified_gmt":"2016-10-07T18:26:58","slug":"ios-apps-data-vulnerability","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/","title":{"rendered":"1,500 Apple-Approved iOS Apps at Risk From Data-Exposing Vulnerability"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10921\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-image.jpg\" alt=\"rotten-apple-image\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-image.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-image-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-image-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>There&#8217;s something rotten in the state of Apple security.<\/p>\n<p>In recent weeks the company has seen its products bedevilled with security flaws, said it&#8217;s <a title=\"Rootpipe Backdoor Flaw Not Going to be Patched on Older Versions of OS X\" href=\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-backdoor-flaw-no-patch\/\" target=\"_blank\">too hard<\/a> to patch users running vulnerable, older versions of its software, and when it has released a security patch for at least some of its at-risk users\u2014seen it <a title=\"OS X Yosemite Still Vulnerable to Rootpipe Attacks\" href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/\" target=\"_blank\">fail abysmally<\/a> to protect against the problem it was supposed to defend.<\/p>\n<p>Meanwhile, against this backdrop, Cupertino has been <a href=\"https:\/\/www.intego.com\/mac-security-blog\/where-did-virusbarrier-ios-go\/\" target=\"_blank\">banning legitimate anti-virus apps<\/a> from the iOS app store\u2014apparently on a whim.<\/p>\n<p>Can things get worse?<\/p>\n<p>Well, apparently they can.<\/p>\n<p>Now news reaches us that some 1,500 approved apps in the so-called &#8220;walled garden,&#8221; famously vetted vigorously by Apple, have been found to contain a serious vulnerability that could be exploited by hackers to spy on communications, steal passwords and bank account information.<\/p>\n<p>The problem, according to a <a title=\"Link to SourceDNA blog post\" href=\"https:\/\/sourcedna.com\/blog\/20150420\/afnetworking-vulnerability.html\" target=\"_blank\" rel=\"nofollow\">blog post<\/a> by security analytics firm SourceDNA, lies in AFNetworking, a popular open-source library used by developers to give their apps networking capabilities.<\/p>\n<p>Unfortunately, a version (2.5.1) of AFNetworking was released in January that contained a serious vulnerability that could allow malicious hackers to launch man-in-the-middle attacks, busting wide open HTTPS\/SSL traffic for interception.<\/p>\n<p>In other words, if you have an app on your iPad or iPhone that uses AFNetworking 2.5.1, any communications you make using that app\u2014including your passwords or private conversations\u2014could be stolen.<\/p>\n<p>AFNetworking was <a title=\"Link to blog post about vulnerability\" href=\"http:\/\/blog.mindedsecurity.com\/2015\/03\/ssl-mitm-attack-in-afnetworking-251-do.html\" target=\"_blank\" rel=\"nofollow\">patched in late March<\/a>, but that&#8217;s no good to you if the at-risk apps you are running on your iOS device have not been recompiled using the new fixed version of the library.<\/p>\n<p>Even if you have updated at-risk apps since AFNetworking was fixed in late March, that&#8217;s no guarantee that the apps on your smartphone are now secure and\u2014of course\u2014there&#8217;s no way to be 100% certain that anything you did with vulnerable apps since January might not have fallen into the hands of hackers.<\/p>\n<p>So, you probably have some questions&#8230;<\/p>\n<p><strong>What apps are vulnerable?<\/strong><br \/>\nSourceDNA says that some apps from big name companies were affected, including Yahoo, Microsoft, Uber, and Citrix. However, no definitive list of affected apps has yet been released in an attempt to avoid real-life attacks.<\/p>\n<p>It&#8217;s also worth bearing in mind that any list is likely to change, as app developers produce new versions including the fixed AFNetworking library.<\/p>\n<p><strong>So how am I supposed to tell if I&#8217;m at risk?<\/strong><br \/>\nSourceDNA has produced an <a title=\"Search for vulnerable apps\" href=\"http:\/\/searchlight.sourcedna.com\/lookup\" target=\"_blank\" rel=\"nofollow\">online search facility<\/a> where you can enter an app vendor, and find out whether their product is vulnerable and if a fixed version has been released.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-40663\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/citrix.jpeg\" alt=\"Vulnerable Citrix app\" width=\"600\" height=\"367\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/citrix.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/citrix-150x91.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/citrix-300x183.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><strong>If I have a vulnerable app on my iPhone or iPad, does that mean that the entire device is exposed?<\/strong><br \/>\nNot at all. This isn&#8217;t a problem with iOS. This is a problem with a code library which might be in some of your apps. Only activity you have inside those apps might be at risk. Which is something, I suppose.<\/p>\n<p><strong>I thought Apple was supposed to be really rigorous about vetting apps, and meant to stop apps that might endanger me from getting into the App Store?<\/strong><br \/>\nYes, you thought correctly. In this instance, they failed. In their defence, their current testing methodology might not be extensive enough to pick up these kind of flaws.<\/p>\n<p><strong>So what is Apple going to do about it?<\/strong><br \/>\nWhat would you like them to do?<\/p>\n<p><strong>How about they remotely remove any vulnerable apps from users&#8217; iPhones and iPads?<\/strong><br \/>\nAhh. The nuclear option.<\/p>\n<p>Well, yes. They could do that, and it could be argued that from the security and privacy point of view that might be the correct course of action. However, it sure sounds inconvenient and would probably cause an uproar amongst users.<\/p>\n<p><strong>Okay, well how about they remove vulnerable apps from the App Store until fixed versions are available?<\/strong><br \/>\nAgain, that might be an option. But I can still see how that may prove unpopular with both users and app developers\u2014some of whom might say they&#8217;re not concerned about the theoretical risk and are happy to take their chances until a fixed version of the app is available.<\/p>\n<p><strong>Hmm. Shouldn&#8217;t Apple simply stop vulnerable apps getting into the App Store in the first place?<\/strong><br \/>\nI&#8217;m with you there! That would be nice, wouldn&#8217;t it? But it&#8217;s not really possible to do that with 100% precision &#8211; and delays in vetting would no doubt cause unrest amongst developers and users too.<\/p>\n<p><strong>Surely there&#8217;s something else that could be done to protect users from risks like this? Couldn&#8217;t you run a scanner to see if you have a dodgy app or security problem on your device?<\/strong><br \/>\nYou mean a bit like anti-virus software does on your Mac or PC? Yes, that might be a good idea for iPads and iPhones too. After all, that&#8217;s what you can do on Android which, to be fair, suffers much more from malicious attacks than iOS.<\/p>\n<p>But, there&#8217;s a problem.<\/p>\n<p><strong>What&#8217;s that?<\/strong><br \/>\nApple doesn&#8217;t very much like the idea of anti-virus vendors writing products for iOS. In fact, it <a href=\"https:\/\/www.intego.com\/mac-security-blog\/where-did-virusbarrier-ios-go\/\" target=\"_blank\">bans even ones with basic functionality<\/a> from the App Store\u2014let alone the kind of sophisticated functionality that security firms would love to build into them.<\/p>\n<p>Like I said, something is rotten in the state of Apple security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Things have recently gone rotten in the state of Apple security.  Can things get any worse?<\/p>\n<p>Unfortunately, it seems, yes they can.<\/p>\n","protected":false},"author":34,"featured_media":10913,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,5],"tags":[2164,3151,69,106],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Things have recently gone rotten in the state of Apple security. Can things get any worse?  Unfortunately, it seems, yes they can.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"1,500 Apple-Approved iOS Apps at Risk From Data-Exposing Vulnerability - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Things have recently gone rotten in the state of Apple security. Can things get any worse?  Unfortunately, it seems, yes they can.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-22T16:57:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-07T18:26:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/\",\"name\":\"1,500 Apple-Approved iOS Apps at Risk From Data-Exposing Vulnerability - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#primaryimage\"},\"datePublished\":\"2015-04-22T16:57:22+00:00\",\"dateModified\":\"2016-10-07T18:26:58+00:00\",\"description\":\"Things have recently gone rotten in the state of Apple security. Can things get any worse? Unfortunately, it seems, yes they can.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"1,500 Apple-Approved iOS Apps at Risk From Data-Exposing Vulnerability\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"1,500 Apple-Approved iOS Apps at Risk From Data-Exposing Vulnerability\",\"datePublished\":\"2015-04-22T16:57:22+00:00\",\"dateModified\":\"2016-10-07T18:26:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#webpage\"},\"wordCount\":883,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg\",\"keywords\":[\"AFNetworking\",\"Apple\",\"iOS\",\"Privacy\"],\"articleSection\":[\"Apple\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Things have recently gone rotten in the state of Apple security. Can things get any worse?  Unfortunately, it seems, yes they can.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"1,500 Apple-Approved iOS Apps at Risk From Data-Exposing Vulnerability - The Mac Security Blog","og_description":"Things have recently gone rotten in the state of Apple security. Can things get any worse?  Unfortunately, it seems, yes they can.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-04-22T16:57:22+00:00","article_modified_time":"2016-10-07T18:26:58+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/","name":"1,500 Apple-Approved iOS Apps at Risk From Data-Exposing Vulnerability - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#primaryimage"},"datePublished":"2015-04-22T16:57:22+00:00","dateModified":"2016-10-07T18:26:58+00:00","description":"Things have recently gone rotten in the state of Apple security. Can things get any worse? Unfortunately, it seems, yes they can.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"1,500 Apple-Approved iOS Apps at Risk From Data-Exposing Vulnerability"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"1,500 Apple-Approved iOS Apps at Risk From Data-Exposing Vulnerability","datePublished":"2015-04-22T16:57:22+00:00","dateModified":"2016-10-07T18:26:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#webpage"},"wordCount":883,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","keywords":["AFNetworking","Apple","iOS","Privacy"],"articleSection":["Apple","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/ios-apps-data-vulnerability\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-azC","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/40648"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=40648"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/40648\/revisions"}],"predecessor-version":[{"id":48001,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/40648\/revisions\/48001"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/10913"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=40648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=40648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=40648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}