In recent days, some controversy has begun to appear in relation to a new virus called Wireluker that seems to have begun to infect hundreds of thousands of devices in the iPhone range around the world. Apparently, the virus spreads from an extra-official Asian application store that goes by the name of Maiyadi and that, once the user downloads an application from it, automatically infects the computer in such a way that any iPhone that connects to it via USB is also infected. Given the danger of this infection, the American company Apple has already taken action on the matter: it has begun toblock all applications that are suspected of containing malicious code of this virus.
According to the first investigations, this malicious code has already affected more than 467 applications which, in turn, have been downloaded a total of 350,000 times in the last six months. The problem is that it is the users themselves who are exposing their privacy, since the Maiyadi application store in which this Trojan has been generated turns out to be a store completely unrelated to Apple in which payment applications are offered piratedly that they have not passed any checks to certify that they are free of malicious code.
In short, Apple has controlled the situation in such a way that no user who has not downloaded any application from this extra-official store should worry about the integrity of his smartphone.
And remembering the importance of security in the world of mobile telephony, we cannot miss this occasion without listing the most important security tips to keep an iPhone protected against the threats that circulate on the network:
- Never download applications outside the App Store. A user with mobile phone knowledge can risk downloading applications from reputable third-party sources, but the vast majority of iPhone owners should not try to download any application beyond the Apple App Store. This is the best way to completely avoid any threat in the form of malicious application.
- Avoid connecting the iPhone via USB to other computers. A simple connection between an iPhone and a computer through the USB cable can be enough for someone with unethical purposes to have the opportunity to steal all the information stored on the mobile. Therefore, it is recommended to connect iPhone only to trusted computers.
- Use security patterns. An unlock code or a fingerprint registered on the iPhone are very effective protection measures in order to keep the information stored on the mobile protected when it is lost or left in the hands of another person. Although it may seem annoying to have to enter a code every time the mobile is unlocked, it is a security measure that can save many headaches in the future.