Mac security firm ships first-ever iPhone malware scanner
Lets iOS device owners do 'on-demand' scans of file attachments
Computerworld - A French security company known for its Mac OS X antivirus software today released the first malware-scanning app for the iPhone and iPad and iPod touch.
Intego's VirusBarrier for iOS has been approved by Apple, and debuted on the App Store Tuesday for $2.99.
Because iOS prevents the program from accessing the file system or conducting automatic or scheduled scans -- as do virtually all Mac and Windows antivirus software -- VirusBarrier must be manually engaged, and then scans only file attachments and files on remote servers, said Peter James, a spokesman for Intego.
"Because of the sandbox, you can't scan the file system," said James. "Since you don't see the iOS file system, the only things you can scan are attachments sent by email or files in, say, your Dropbox folder."
Unlike software written for Android -- such as Lookout, from the San Francisco-based company by the same name -- VirusBarrier cannot scan apps for possible infection.
When an email attachment is received by the iPhone, iPad or iPod Touch, the user can intercede by calling on VirusBarrier, which then scans the file for possible infection before the file is opened or forwarded to others.
"We've had enterprise customers say that although they know you can't do a full system scan of an iPhone, they don't like the fact that files go through these devices and end up on a Mac or Windows PC," said James. "They want their users to be able to check that an attachment is safe."
He characterized VirusBarrier for iOS as a way for iPhone and iPad users to prevent their hardware from spreading malware. "You don't want your iPhone becoming a 'Typhoid Mary,'" James said.
The scanning engine and signatures -- the digital "fingerprints" used to detect malware -- in VirusBarrier for iOS are identical to those used by Intego's Mac OS X product line.
"It's important that people understand what [VirusBarrier] can and cannot do," said James, pointing to the malware scanner's limitations. "Although there is no malware written for iOS today, if attackers do try to exploit the [recent] PDF vulnerability, this is something we can scan for."
James was referring to the still-unpatched vulnerability in iOS that can be exploited through a malicious PDF document, one of two bugs used last week to "jailbreak" an iPhone, iPad or iPod Touch.
VirusBarrier for iOS can be downloaded to an iPhone, iPad or iPod Touch from Apple's App Store. It requires iOS 4.0 or later.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
- Apple's CarPlay vs. MirrorLink: Is there a need for both?
- Apple's CarPlay to spark mobile apps war in your car
- iTunes is almost as big a biz as OEM Windows
- Icahn says 'I can't' and stops $50B fight over Apple stock buyback
- Lenovo-Moto deal's impact on Apple? Zip
- Office 365 turns one, but success is tough to tally
- Everyone bets on bigger iPhone for '14
- Apple's iPod business collapses as revenue becomes a rounding error
- Update: More than 1B smartphones were shipped in 2013
- Cook admits Apple blew the call on the iPhone 5C
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts