Given the high degree of vetting for applications in the App Store, the only real way for malware to become installed on an Apple device is by exploiting …

This article was originally published here