Metaforic, a company that specializes in security software for anti-subversion protection, extended its software immunization protection to Apple’s iOS platforms. Metaforic
notes that 2011 saw more than 200 million iOS devices sold with more than 14 billion Apple apps downloaded, a proliferation that the company says has been accompanied by “an explosion of malware on these devices.”
Whether or not that’s completely accurate, it’s always good news to hear that a security software vendor is extending its services to iOS, empowering developers to create secure and tamper-proof applications.
Dr. C. Warren Axelrod, research director for financial services at U.S. Cyber Consequences Unit, says that "The proliferation of iPhones, iPads and Android mobile devices greatly increases the risk of identity theft, fraud and espionage.”
“This is particularly evident as the public's use of these devices grows for financial transactions and companies allow employees to Bring Your Own Device (BYOD) to their workplaces," Dr. Axelrod explains.
“Metaforic's unique tamper-proofing approach to application, data and transaction security provides an effective and efficient way to harden apps against malicious attacks,” he says.
iOS developers can employ Metaforic technology to automatically infuse a patented immune system into their iOS apps which, in turn, ensures they can defend their apps from malware, effectively giving the end-user the protection he / she deserves.
Protection extends to subversion, tampering, or other attacks.
“Building security into the application is particularly critical on iOS as Apple restricts third-party security applications, such as anti-malware offerings or BYOD protection,” according to Metaforic.
Even in exposed environments, Metaforic enables application creators to protect their apps against such threats, even if customers have a jailbroken handset, the company says.
Some of the most common attacks on iOS applications that Metaforic can prevent include repackaging applications with malicious malware, attacks on communications (such as MITM), signature or encryption key subversion, malware that changes application logic.