B. iOS Threats: Compared to Android, iOS has few threats and types of attacks. The reasons of attacking Android is described in the previous section [30], and that are mitigated in iOS. There is a strict process to review and sign Apps before accepting it in Apps Store [3,4,15]. iOS is also less openness and less compatible with other third parties Apps. The literature has limited studies on iOS threats. Approximately of 200 different vulnerabilities discovered in many versions of the iOS up to April 2012[4]. One could overstate and say that the iOS users have little reasons to worry about malw are [14]. In spite of that, and moreover in spite of the continuing security updates of Apple; there is no smartphone platform invulnerable from security risks and attacks [16]. One of the biggest challenges in the iOS security is the jailbreaking of iPhone devices. Jailbreaking described in [17] as "a technique where a flmv in the iOS operating system is exploited to unlock the device, thereby obtaining systemlevel (root) access." As a consequence of jailbreak the root exploit is one of iOS security volatiles [14]. Jailbreak didn't take its share of literature. A brief review of jailbreaking iOS is introduced in [4]. Generally, iOS has different types of attacks and vulnerabilities. Examples of vulnerabilities are related to the iOS code signing. Others violated the data security of iOS such as the hardware and the keychain encryptions. Others, brute force ones, are about the possible decryptions of files due to the weakness of iPhone passcode which is only 4 digit . Jailbreak is another types of vulnerabilities. All those vulnerabilities are discussed in [4].