With the growth and development of modern technology what also increased in leaps and bounds are the ways and means to misuse it. The scientific advancements are not without its curses. People with wrong motive use these for their selfish ends. Computer hackers are one such cyber thieves who, by using their modern technologies can steal valuable information from electronic devices of other people.
Focusing on this security issue, Apple recently launched a new defense mechanism to protect the electronic devices and safeguard the valuable personal information of the users- like the bank account number, passwords and credit card numbers. The mechanism would also act as a shield from unauthorized viewing of contact information, emails. Apple received a warning for such a crisis earlier this year from three scientists.
Yeongjin Jang and Chengyu Song, two graduate pupils and a research scientist from Georgia Institute of Technology, Billy Lau has been working to resolve the issue. The three of them demonstrated security susceptibility and their research result at the convention held on Wednesday in Las Vegas. After the said hacking convention of Black Hat, almost as many as seven thousand security personnel are going through a period of training on the threats of modern day cyber hackers and the strategies to overcome them.
While explaining their research in the Las Vegas meet the trio gave a complete demonstration of their study and their findings. They connected an iPhone with a customized charger attached to a computer that is automated to attack the iOS gadget and it did. Thereby proving their point.
The research results are expected to be made public by autumn of this year. Until then the problem would persist. The security up gradation targets iPhones and iPads, which are mostly affected when the user connects it to the fake charging station. The new software version is known as iOS 7 that has been provided to the software developers for further analysis and security check. However, the operating system for the Android is not prone to these kinds of attack. As the users are automatically warned of the presence of a bug as soon as they connect their device with a computer, serving as a charging agent.
The latest beta iOS 7 is guaranteed to serve a two-way purpose namely, as a protector of the software from any unlawful activity and it is expected to become a spying tool for the user. Prevention is better than cure –the Apple researchers seem to comprehend that lately- a scientist commented that right now they are focusing on discovering the security bug, which will enable the company to fix them even before the criminals can detect them and take advantage. Billy Lau opined that the best way to solve a problem is not to shut it down but to discuss it openly. As the criminals of the cyber world are growing smarter day by day. Truly, it is always not very easy to identify them. What we can do is to be on our safeguard as much as possible. The best way is to discuss it frankly and adopt safety measures.
Common Reasons For Visiting An Orthopaedic Surgeon
Have you suffered regular knee or back pain? Do you feel tired or stiff for a long time after resting...
Best Wholesale Beauty Product Suppliers In 2020
Beauty products include a range of goods that are used to care and enhance the appearance of your face, hair,...
Big Things A Digital Marketing Business Conducts
The customary word “ad” is defined as a communication procedure between the group of onlookers and the imminent business moving...
International Shipping In A Global Pandemic
The Covid-19 pandemic completely turned the world on its head, in more ways than one. Beyond the devastating medical challenges,...
8 Ways To Reduce Stoke Risk
Stroke is the fifth leading cause of death in the United States. To help you understand how severe and common...
Top Whey Protein Recipes To Lose Your Body Fat
Losing weight and keeping the kilos off is not an easy thing to do. Everything from what you consume to...
5 Amazing SEO Tools to Spy On Your Competitor’s Website
So, you’re running an online business, and you surely want your business to get the best results. But, there are...
Keep .eu Domain After Brexit
Domains are becoming as essential as someone’s own home in the world of internet. Internet users are always looking for...
How To Use Apple Cider Vinegar With Mother To Maximize The Health Benefits
Apple cider vinegar is used in many different household chores like floor washing, cleaning, doing dishes, vegetables and fruits washing,...
8 Tips from Dermatologists For Gorgeous Skin
We all wish of a flawless and glowing skin, but it’s not always easy to figure out the skin care...
Uterine Fibroids: What Are Its Causes, Symptoms, and Treatments?
Uterine Fibroids are non-cancerous tumors that develops in a woman’s uterus. They are also called leiomyomas or myomas and appear...
Electric Stove or Gas Stove? Which One is Better?
While remodeling your kitchen to include some kitchen essentials or buying a whole new house, you might be comparing electric...
6 Surprising Health Benefits Of Making Origami
It has been centuries since Origami has been developed, and until now, people still use this art. This is not...
Personal Protective Equipment That Protects You From Workplace Hazards
The workplace is full of hazards. Whether you’re working in the construction sector, the automobile industry, manufacturing, or any other...
3 Tips to Finding Financial Savings
If you’ve not been doing the best of job finding savings over time, don’t you think now would be a...
- Tech5 years ago
Creating An e-Commerce Website
- Tech5 years ago
Design Template Guidelines For Mobile Apps
- Business5 years ago
The Key Types Of Brochure Printing Services
- Travel8 years ago
Who Else Wants Also Nfl Hat
- General5 years ago
Kobe Bryant With His Unique Nba Jerseys
- Tech5 years ago
Climb Google Using These Checklists
- Tech6 years ago
Why Small Businesses Can't Ignore Mobile Technology
- Health7 years ago
Health Supplements For Sports Activities Nutrition