Cyber-attack on Apple's App Store, affecting hundreds of Chinese apps.

This is the first time that Apple's App Store so widely detected presence of any hazardous App,  
America's leading maker of computers and mobile phones, according to Apple App Store in China revealed the presence of a malicious software is removed from the apps store.Before it was known that hundreds of apps in the Chinese App Store harmful software. X Code Ghost 'is present.The program's presence in the App Store was given on behalf of the cyber-security companies.Apple says that the hacker harmful apps in the app to add code to convince the experts that work for the fake version of Apple's operating system iOS use.Company spokeswoman Christine munaghan said in an e-mail message, "We made this fake software applications are removed from the app store."The spokesman also said that the company is in contact with those apps development so as to ensure that their applications for resettlement, are using the correct version of the X code.Reuters reported that Apple's App Store is the first time such a large-scale presence of hazardous app is detected. 




Apple was not too far from the user Make sure that the machine is not affected on the app

Apple's experts are constantly reviewing your app store and cyber security company Palo Alto Networks Inc. The cyber attack earlier today in the App Store, only five times that identifies the presence of a hazardous application.X contaminated version of the code was downloaded from a server in China.Chinese cyber-security firm myhu 360 technology company said it found that 334 applications were affected by the Ghost X code.However, Apple also affected given no information about the number of apps.Apple was not too far from the user Make sure that the application on their machine is not affected.Palo Alto Network's Director of Threat Intelligence for the attack, Ryan Olson says 'great thing' because it is proved that the hacker can also affect Apple's App Store.He says that other cyber attackers can also use this method and it is not easy to defend.



 

No comments:

Post a Comment