How much can you trust your devices? In this blog post, we will cover a practical attack that utilizes the iPhone Configuration Utility, a malicious Mobile Device Management (MDM) server, and a little bit of social engineering to get you data from iOS devices, HTTP and HTTPS web traffic, and possibly domain credentials.
more here...........https://www.netspi.com/blog/entryid/230/malicious-mobile-configs
more here...........https://www.netspi.com/blog/entryid/230/malicious-mobile-configs