Network Monitoring for iOS & other vulnerabilities

For some time, I have seen malware protection suites for Android OS provided by Google Play. Yet, I wondered how iOS mobile devices are being protected from outside, malicious attacks. It was the general consensus that, iOS did not suffer from many vulnerabilities or attacks because the OS continuously updates itself, the iOS market ‘screens’ it’s entries, and that there not many back-door entries to attack the iOS. Until recently, IT consultants from a mobile security company called, Skycure thinks otherwise. They believe, it is a matter of time until someone finds a way to attack these devices.

How will future attacks be combated? The article is featured on Securityweek, called Security Monitors Network Activity of iOS Devices for Security, by Brian Prince. It talks about a method developed by Skycure, that identifies impeding attackers before anything happens. How does this work?

  • A ‘honeypot’ method is used to attract attackers, to give up actions that would otherwise elicit an impeding attack (SecurityWeek, 2013)

As defined by Symantec, there are various different types of honeypots. Honeypots are controlled environments; a replica server that monitors the behaviors of an attacker by mimicking end-user behavior, which lures an attacker to perform attacks to the server.

Skycure believes that traditional methods for detecting malware attacks are getting outdated. Jared Carleton, the principle consultant at Frost & Sullivan, states in the SecurityWeek article, Whether it be through social engineering or exploitation of vulnerabilities, devices are vulnerable, and solutions such as those from Skycure will soon become a base requirement for companies.” The premise of this project is to protect and detect against malicious attacks, not to eliminate the attacks. It is a stepping stone, that which specialists can use to develop a patch, to counter the attack in the future.

According to the article, Skycure‘s solution hopes to cover three different areas in mobile security, which include: “attacks from the Internet, attacks from the device toward the corporate intranet, and attacks that result in sensitive data being leaked out of the device.” (SecurityWeek, 2013)


Prince, B. (2013, October 17). Skycure Monitors Network Activity of iOS Devices for Security | SecurityWeek.Com. Security Week. Retrieved November 11, 2013, from

Riden, J., & Seifert, C. (2010, November 2). A Guide to Different Kinds of Honeypots. Endpoint, Cloud, Mobile & Virtual Security Solutions. Retrieved November 11, 2013, from


4 thoughts on “Network Monitoring for iOS & other vulnerabilities

  1. I think iOS is in the same boat than MacOS X. For a long time people thought Mac OS X was inherently more secure than Windows, not realizing that Windows had 90+% market share and thus it was way more attractive to develop viruses and other malware for this platform.

    iOS is fairly protected so far because it is a closed platform. But it is only a question of time before it gets heavily targeted.

    • How hard would it be, to disguise a trojan virus or malware into an application that was passed by Apple? That would be put into the market for people to download onto their devices. Besides, what does Apple look for before the app is approved? What if they cant spot the virus, because of a loophole entry?

  2. I have to agree with the IT Consultants not only because they are experts at what they do, but because they present a logical opinion. There was recent news that Android destroyed iOS during the third quarter of this year by a whopping 81%! gmalkas is right; Android is currently more attractive to hackers since it controls most of the market and since iOS has better security. But soon enough, someone will find a way to break through the security system and take advantage due to the fact that not many people are attacking iOS as compared to Android.

  3. I think the concept of a honeypot is a great idea. However, I wonder if there is any way for hackers to reveal that this replica server is just that. Hopefully, with Skycure’s new comprehensive approach to handling mobile attacks, the threat will be less imminent to mobile users. Up to this point in time, I had only briefly considered the possibility of an attack on my mobile device, so I should definitely research this topic more in-depth to avoid a conflict of that nature.

Comments are closed.