Results 1 to 9 of 9
  1. #1


    Member Since
    Mar 25, 2012
    Posts
    9
    Specs:
    iMac OSX Lion 10.7.3, iPhone 4S, iPad2
    IPhone spyware backed up on iMac?
    If there is spyware illegally installed on my iPhone and I clean phone and reinstall new iOS, is it possible that the spyware is on my iMac from having backed up phone in iTunes, and how would I remedy this issue?

  2. #2

    cwa107's Avatar
    Member Since
    Dec 20, 2006
    Location
    Lake Mary, Florida
    Posts
    26,932
    Specs:
    15" MBP, Core i7/2GHz, 8GB RAM, 480GB Crucial M500 SSD
    Quote Originally Posted by ReginaLampert View Post
    If there is spyware illegally installed on my iPhone and I clean phone and reinstall new iOS, is it possible that the spyware is on my iMac from having backed up phone in iTunes, and how would I remedy this issue?
    Software that runs on iOS doesn't run on Mac OS X and vice versa, and that includes malware. Regardless, there is no malware for iOS (unless of course you have it jailbroken, in that case all bets are off).
    Liquid and computers don't mix. It might seem simple, but we see an incredible amount of people post here about spills. Keep drinks and other liquids away from your expensive electronics!

    https://youtu.be/KHZ8ek-6ccc

  3. #3


    Member Since
    Mar 25, 2012
    Posts
    9
    Specs:
    iMac OSX Lion 10.7.3, iPhone 4S, iPad2
    Yet i have read that the cellphone spyware that can access and monitor your phone and text and microphone etc works on iPhone as well, and does not have to be jailbroken, can be sent in text or as an innocuous attachment with photo or something.

  4. #4

    cwa107's Avatar
    Member Since
    Dec 20, 2006
    Location
    Lake Mary, Florida
    Posts
    26,932
    Specs:
    15" MBP, Core i7/2GHz, 8GB RAM, 480GB Crucial M500 SSD
    Quote Originally Posted by ReginaLampert View Post
    Yet i have read that the cellphone spyware that can access and monitor your phone and text and microphone etc works on iPhone as well, and does not have to be jailbroken, can be sent in text or as an innocuous attachment with photo or something.
    Can you cite the article you're referencing? With the way Apple handles executable code on iOS, unless this is done with a zero day exploit that hasn't been patched, it would be extraordinarily difficult.
    Liquid and computers don't mix. It might seem simple, but we see an incredible amount of people post here about spills. Keep drinks and other liquids away from your expensive electronics!

    https://youtu.be/KHZ8ek-6ccc

  5. #5


    Member Since
    Mar 25, 2012
    Posts
    9
    Specs:
    iMac OSX Lion 10.7.3, iPhone 4S, iPad2
    Ok--i have reread some of the several articles I was reading earlier, and realize that my initial concern for my daughters' phones ( to which the bad guy might have access despite pwds) is valid as they do not have iPhones, and so while there is substantial proof of such an app on theirs, my iPhone is not physically accessible to bad guy, and if Apple iOS is as you say, which I actually had always thought, then it sounds like I should be ok. My extensive reading on the general phone spying subject has provided an avalanche of info and likely mis-info as well. However, I do get the clicking sounds and unusual lighted up screens every now and then, and am still concerned I could have such an illegal access to my phone. However, your comment has calmed most of my fears, especially about getting something onto my Mac from the phone. Is this also true with iCloud use? Is it because the OSes are different?

  6. #6


    Member Since
    Mar 25, 2012
    Posts
    9
    Specs:
    iMac OSX Lion 10.7.3, iPhone 4S, iPad2
    Also, if my daughter's itouch is not jailbroken, could a monitoring app be put on it if bad guy has access to it, and could this have remote monitoring abilities?

  7. #7

    cwa107's Avatar
    Member Since
    Dec 20, 2006
    Location
    Lake Mary, Florida
    Posts
    26,932
    Specs:
    15" MBP, Core i7/2GHz, 8GB RAM, 480GB Crucial M500 SSD
    I'd like to clarify a few things as there is a LOT of misconception out there about how computing devices can be compromised. I like to refer to this misconception as the "CSI effect" - what makes for good TV is not necessarily based on reality.

    Let's start with the basics. Your iPhone/iPad/iPod Touch is a computer like any other. Just because it works like a cell phone, doesn't make its nature any different. Computers can't do anything they are not programmed to do. Its mission in life is to run programs, created by humans. It can't contract an illness like a person can, just by being exposed to it. Yes, there are some parallels between how a computer virus behaves like a biological virus, but these are strictly aesthetic and don't work the same way under the surface. Knowing that allows you to look at some of the more sensational articles going around with a more skeptical eye.

    One of the things that Apple is regularly criticized for with their iOS devices is that they operate within a "walled garden". That is, your iOS device can't run *any* programs that Apple hasn't explicitly put their stamp of approval on. This is the reason you can't run Flash, because Apple has determined that they don't want it running on iOS.

    This approach has some pros and cons. On the positive side, it pretty much eliminates the possibility of a virus or other form of malware like spyware. Even if a bad guy wrote a program designed to monitor your every move, without getting approval from Apple, it simply won't run on your iOS device. The only time that's not true is if Apple has left some kind of security hole or bug in the operating system that a hacker can use to force the program to run. This is what is known as an "exploit". Exploits are often found in every computer operating system under the sun, and typically the manufacturer is notified of the condition and they patch for it rapidly. But occasionally one slips out before the manufacturer has recognized it. This is what is known as a "zero day exploit". These are usually pretty far and few between, but it does happen. When it does, Apple is usually pretty quick to put a patch in place that closes the hole.

    Another thing that can happen (and again, it's pretty rare) is that Apple will approve an app for the App Store that has some kind of undesirable program within it, but its disguised as a desirable program. In these cases, Apple will typically pull the program from the App Store, ban the developer from publishing new software and they also have the ability to "kill" the app from your iOS device without your consent. These events are extremely rare and when they happen, are usually well publicized.

    The negative aspect to this "walled garden" approach is that you can only run software that Apple thinks is OK. A good example, mentioned earlier, is Flash. While iOS devices are technically capable of running Flash, Apple has decided that it's in your best interest that it isn't available. There are also frequent examples of situations where Apple has approved a piece of software, but upon further consideration, decides that they don't want people running it and so they'll pull it from the store. This frequently happens with apps that Apple has a moral or ethical problem with - or in cases where someone has asserted an intellectual properly claim upon an app published by another entity. A good example of this is when someone published a Tetris clone before EA (the rights holder) had a chance to publish the official Tetris app for iOS. Apple pulled the (free) clone and the only option for iOS device users was to buy EA's Tetris.

    With that said, you can "jailbreak" your iOS device. When you do this, you are simply removing the protection mechanisms that are put in place to enforce the walled garden. You can run whatever software you wish - but you are doing it at your own risk. It's not entirely simple to do so either, since jailbreaking it means that you're making fundamental modifications to the OS that have the potential to "brick" your device if applied incorrectly.

    Jailbreaking software typically takes advantage of the aforementioned known exploits in the OS in order to run - and to do it requires physical access to the device and a certain amount of effort applied on your part. You can't, for example, simply have a chance encounter with a hacker and have your phone jailbroken unbeknownst to you - which is a frequent scenario played out on popular TV shows. Also, since Apple is usually pretty good at patching for these exploits, they frequently will negate the jailbreaking software by releasing an OS update. The moral of this story is that if you like the protection afforded by the "walled garden", it's a good idea to update your iOS device as soon as a new update is released.

    Now, full-blown computers like the Mac, Windows and Linux machines are different in this regard as they allow you to run whatever software you want to, without seeking the OS manufacturer's permission. The same applies to Android devices to a degree. And it is for that reason, that it's more likely you'll encounter some form of malware on one of those platforms.

    Hope that makes sense - and let me know if any of your questions remain unanswered.
    Liquid and computers don't mix. It might seem simple, but we see an incredible amount of people post here about spills. Keep drinks and other liquids away from your expensive electronics!

    https://youtu.be/KHZ8ek-6ccc

  8. #8


    Member Since
    Mar 25, 2012
    Posts
    9
    Specs:
    iMac OSX Lion 10.7.3, iPhone 4S, iPad2
    Thank you so very much for your detailed reply-- I greatly appreciate it! I feel much more clear on how these things work, and I am yet again glad I am a Mac Gal!

  9. #9


    Member Since
    Jan 22, 2010
    Location
    Victoria, BC
    Posts
    20,911
    Specs:
    Mid-2012 MBP (16GB, 1TB HD), Monoprice 24-inch second monitor, iPhone 5s 32GB, iPad Air 2 64GB
    The only thing I would add to cwa107's OUTSTANDING post is that to the best of my knowledge there is ZERO malware of any kind on (un-jailbroken) iOS -- something that cannot be said for Android.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Does this sound like spyware? How else could this have happened to my iPhone?
    By eeliot in forum iPhone Hardware and Accessories
    Replies: 2
    Last Post: 10-28-2014, 10:25 PM
  2. Replies: 2
    Last Post: 10-23-2011, 02:17 PM
  3. iphone backup (What exactly is backed up?)
    By kilohurtz in forum iOS and Apps
    Replies: 2
    Last Post: 10-07-2008, 12:41 PM
  4. Seeing my backed up Ipod
    By dshorr in forum Music, Audio, and Podcasting
    Replies: 10
    Last Post: 12-17-2007, 02:16 PM
  5. PC to iMac advice on virus and spyware
    By Big Dog Dad in forum Apple Desktops
    Replies: 1
    Last Post: 10-26-2004, 05:11 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •