{"id":1297,"date":"2010-04-28T01:17:49","date_gmt":"2010-04-28T06:17:49","guid":{"rendered":"https:\/\/www.fusioninformatics.com\/blog\/?p=1297"},"modified":"2017-08-18T05:14:14","modified_gmt":"2017-08-18T05:14:14","slug":"ipad-users-targeted-by-hackers","status":"publish","type":"post","link":"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/","title":{"rendered":"iPad users targeted by hackers"},"content":{"rendered":"<p>Users tricked in to downloading fake iTunes update that contains malicious code <\/p>\n<p>  Security experts have warned that Apple iPad users are being targeted by cyber criminals. Hackers are trying to dupe iPad owners in to downloading a fake iTunes update on their Windows computer, which, when installed, creates a backdoor for cyber criminals, allowing them to remotely access the machine or even use the computer to send spam messages.<\/p>\n<p>  A dialog box pops up telling the user that a recent iTunes update has been released for the iPad. Users who click on a link are taken to a site that looks exactly like the iTunes download web page, but the file the user downloads is actually a Trojan that installs malicious code on the machine. The Backdoor. Bifrose. AADY virus tries to steal passwords and login details for email accounts and instant-messaging services. <\/p>\n<p>  &#8220;The trick is pretty simple,&#8221; said Catalin Cosoi, a senior researcher for BitDefender, which uncovered the scam. &#8220;They&#8217;re clever to do it this way. If they were able to target Mac customers, it would have spread like wildfire, but because most antivirus companies detect this Trojan, it&#8217;s aimed at Windows users who have bought an iPad and who also don&#8217;t run a security product.&#8221;<\/p>\n<p>  BitDefender has advised iPad owners not to click on any links that appear in dialog boxes or alerts, and to download iTunes directly from the Apple website. The company also emphasised that the iPad itself remained unaffected by the Trojan.<\/p>\n<p style=\"font-size: 9px;\"><b>Resource<\/b>:<br \/>\n  http:\/\/www.telegraph.co.uk\/technology\/apple\/7638376\/iPad-users-targeted-by-hackers.html?utm_source=tmg&#038;utm_medium=TD_ipad&#038;utm_campaign=tech2804am<\/p>\n","protected":false},"excerpt":{"rendered":"Users tricked in to downloading fake iTunes update that contains malicious code Security experts have warned that Apple&hellip;\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[34],"tags":[227,30],"class_list":{"0":"post-1297","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-enterprise-mobile-application-development","7":"tag-apple-ipad","8":"tag-ipad"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>iPad users targeted by hackers | AI and IoT application development company<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iPad users targeted by hackers | AI and IoT application development company\" \/>\n<meta property=\"og:description\" content=\"Users tricked in to downloading fake iTunes update that contains malicious code Security experts have warned that Apple&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"AI and IoT application development company\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/fusioninformatics\/\" \/>\n<meta property=\"article:published_time\" content=\"2010-04-28T06:17:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-08-18T05:14:14+00:00\" \/>\n<meta name=\"author\" content=\"Aashesh Shaah\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@twitter.com\/aasheshdshaah\" \/>\n<meta name=\"twitter:site\" content=\"@fusionlnfo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aashesh Shaah\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/\"},\"author\":{\"name\":\"Aashesh Shaah\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/person\/9ecff371b9255217ed7292905b9e85a6\"},\"headline\":\"iPad users targeted by hackers\",\"datePublished\":\"2010-04-28T06:17:49+00:00\",\"dateModified\":\"2017-08-18T05:14:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/\"},\"wordCount\":273,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#organization\"},\"keywords\":[\"Apple iPad\",\"Ipad\"],\"articleSection\":[\"Mobile Application Development\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/\",\"url\":\"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/\",\"name\":\"iPad users targeted by hackers | AI and IoT application development company\",\"isPartOf\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#website\"},\"datePublished\":\"2010-04-28T06:17:49+00:00\",\"dateModified\":\"2017-08-18T05:14:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.fusioninformatics.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"iPad users targeted by hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#website\",\"url\":\"https:\/\/www.fusioninformatics.com\/blog\/\",\"name\":\"AI, ML and IoT application development company | Fusion Informatics\",\"description\":\"Let&#039;s Transform Business for Tomorrow\",\"publisher\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fusioninformatics.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#organization\",\"name\":\"Fusion Informatics Limited\",\"url\":\"https:\/\/www.fusioninformatics.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2019\/04\/fusion-informatics-logo-copy.jpg\",\"contentUrl\":\"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2019\/04\/fusion-informatics-logo-copy.jpg\",\"width\":400,\"height\":198,\"caption\":\"Fusion Informatics Limited\"},\"image\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/facebook.com\/fusioninformatics\/\",\"https:\/\/x.com\/fusionlnfo\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/person\/9ecff371b9255217ed7292905b9e85a6\",\"name\":\"Aashesh Shaah\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2024\/01\/cropped-AsheshLinkedIN-96x96.jpeg\",\"contentUrl\":\"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2024\/01\/cropped-AsheshLinkedIN-96x96.jpeg\",\"caption\":\"Aashesh Shaah\"},\"description\":\"Currently serving as the CEO of Fusion Informatics Limited, he specializes in helping companies achieve their long-term goals through digital and business transformation strategies and the ongoing evolution of digital products and services.\",\"sameAs\":[\"https:\/\/plus.google.com\/+asheshshah1976\/posts\",\"https:\/\/www.linkedin.com\/in\/aasheshdshaah\/\",\"https:\/\/x.com\/twitter.com\/aasheshdshaah\"],\"url\":\"https:\/\/www.fusioninformatics.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"iPad users targeted by hackers | AI and IoT application development company","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/","og_locale":"en_US","og_type":"article","og_title":"iPad users targeted by hackers | AI and IoT application development company","og_description":"Users tricked in to downloading fake iTunes update that contains malicious code Security experts have warned that Apple&hellip;","og_url":"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/","og_site_name":"AI and IoT application development company","article_publisher":"http:\/\/facebook.com\/fusioninformatics\/","article_published_time":"2010-04-28T06:17:49+00:00","article_modified_time":"2017-08-18T05:14:14+00:00","author":"Aashesh Shaah","twitter_card":"summary_large_image","twitter_creator":"@twitter.com\/aasheshdshaah","twitter_site":"@fusionlnfo","twitter_misc":{"Written by":"Aashesh Shaah","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/#article","isPartOf":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/"},"author":{"name":"Aashesh Shaah","@id":"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/person\/9ecff371b9255217ed7292905b9e85a6"},"headline":"iPad users targeted by hackers","datePublished":"2010-04-28T06:17:49+00:00","dateModified":"2017-08-18T05:14:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/"},"wordCount":273,"commentCount":0,"publisher":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/#organization"},"keywords":["Apple iPad","Ipad"],"articleSection":["Mobile Application Development"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/","url":"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/","name":"iPad users targeted by hackers | AI and IoT application development company","isPartOf":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/#website"},"datePublished":"2010-04-28T06:17:49+00:00","dateModified":"2017-08-18T05:14:14+00:00","breadcrumb":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fusioninformatics.com\/blog\/ipad-users-targeted-by-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fusioninformatics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"iPad users targeted by hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.fusioninformatics.com\/blog\/#website","url":"https:\/\/www.fusioninformatics.com\/blog\/","name":"AI, ML and IoT application development company | Fusion Informatics","description":"Let&#039;s Transform Business for Tomorrow","publisher":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fusioninformatics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.fusioninformatics.com\/blog\/#organization","name":"Fusion Informatics Limited","url":"https:\/\/www.fusioninformatics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2019\/04\/fusion-informatics-logo-copy.jpg","contentUrl":"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2019\/04\/fusion-informatics-logo-copy.jpg","width":400,"height":198,"caption":"Fusion Informatics Limited"},"image":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/fusioninformatics\/","https:\/\/x.com\/fusionlnfo"]},{"@type":"Person","@id":"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/person\/9ecff371b9255217ed7292905b9e85a6","name":"Aashesh Shaah","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2024\/01\/cropped-AsheshLinkedIN-96x96.jpeg","contentUrl":"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2024\/01\/cropped-AsheshLinkedIN-96x96.jpeg","caption":"Aashesh Shaah"},"description":"Currently serving as the CEO of Fusion Informatics Limited, he specializes in helping companies achieve their long-term goals through digital and business transformation strategies and the ongoing evolution of digital products and services.","sameAs":["https:\/\/plus.google.com\/+asheshshah1976\/posts","https:\/\/www.linkedin.com\/in\/aasheshdshaah\/","https:\/\/x.com\/twitter.com\/aasheshdshaah"],"url":"https:\/\/www.fusioninformatics.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/posts\/1297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/comments?post=1297"}],"version-history":[{"count":1,"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/posts\/1297\/revisions"}],"predecessor-version":[{"id":3239,"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/posts\/1297\/revisions\/3239"}],"wp:attachment":[{"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/media?parent=1297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/categories?post=1297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/tags?post=1297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}