With the growth and development of modern technology what also increased in leaps and bounds are the ways and means to misuse it. The scientific advancements are not without its curses. People with wrong motive use these for their selfish ends. Computer hackers are one such cyber thieves who, by using their modern technologies can steal valuable information from electronic devices of other people.
Focusing on this security issue, Apple recently launched a new defense mechanism to protect the electronic devices and safeguard the valuable personal information of the users- like the bank account number, passwords and credit card numbers. The mechanism would also act as a shield from unauthorized viewing of contact information, emails. Apple received a warning for such a crisis earlier this year from three scientists.
Yeongjin Jang and Chengyu Song, two graduate pupils and a research scientist from Georgia Institute of Technology, Billy Lau has been working to resolve the issue. The three of them demonstrated security susceptibility and their research result at the convention held on Wednesday in Las Vegas. After the said hacking convention of Black Hat, almost as many as seven thousand security personnel are going through a period of training on the threats of modern day cyber hackers and the strategies to overcome them.
While explaining their research in the Las Vegas meet the trio gave a complete demonstration of their study and their findings. They connected an iPhone with a customized charger attached to a computer that is automated to attack the iOS gadget and it did. Thereby proving their point.
The research results are expected to be made public by autumn of this year. Until then the problem would persist. The security up gradation targets iPhones and iPads, which are mostly affected when the user connects it to the fake charging station. The new software version is known as iOS 7 that has been provided to the software developers for further analysis and security check. However, the operating system for the Android is not prone to these kinds of attack. As the users are automatically warned of the presence of a bug as soon as they connect their device with a computer, serving as a charging agent.
The latest beta iOS 7 is guaranteed to serve a two-way purpose namely, as a protector of the software from any unlawful activity and it is expected to become a spying tool for the user. Prevention is better than cure –the Apple researchers seem to comprehend that lately- a scientist commented that right now they are focusing on discovering the security bug, which will enable the company to fix them even before the criminals can detect them and take advantage. Billy Lau opined that the best way to solve a problem is not to shut it down but to discuss it openly. As the criminals of the cyber world are growing smarter day by day. Truly, it is always not very easy to identify them. What we can do is to be on our safeguard as much as possible. The best way is to discuss it frankly and adopt safety measures.
Your Basic Guide To Creating A Unique Investment Blog
Starting your own blog is great and once you get the ball rolling, it can be a good passive income...
3 Low-Risk Ways To Get Your New Business Started
Once you’ve got an initial business idea and believe that it will be a success, there are some basic things...
Conquering the Co-free Zone: Tips for Thriving as a Remote Worker
Adjusting to an office environment can come with its downfalls in the sense that it might be a shock to...
3 Ways To Take Control Of Your Finances Starting Now
If your finances have taken over and are bringing stress to your life, we understand just how overwhelming it can...
Best Places To Visit In The North Of England
If you live in England, you will know there are many different places to visit for the weekend. There are...
Green Home Improvement Ideas
In a world where environmental concerns are growing, the concept of “green” has gone beyond a trendy catchphrase and is...
How to Host an Unforgettable House-Warming!
The time has finally come. You have moved into your dream pad, and are officially adulting in your very own...
A Guide to Parking Lot Striping
The journey to a well-striped parking lot begins with the right paint. In this brief guide, we’ll unravel the mystery...
Business Tips For Protecting Your Finances During A Recession
In 2023, taking the necessary steps to protect your finances for your business is now more important than ever. The...
Tips For Cleaning Your Trainers
If you’re into your trainers and streetwear, you’re likely to be very conscious of keeping them looking their best! So,...
Branding Trends For Start-Ups in 2023
Branding is incredibly important as it impacts how your business reaches and connects with its target market. If you’re branding...
Avoiding the Wrong Kind of Growth
Growth is vital for any business – some models, like tech start-ups, are built around periods of dramatic, explosive growth...
How To Become A Property Developer
There are several reasons why an individual will want to become a property developer. One of the main reasons for...
What Is The Difference Between Cyber Attacks and Cyber Threats?
If you own a business that uses the cloud to manage workloads, you have probably heard of the terms cyberattack...
3 Types of Marketing Every Small Construction Business Should Do
Construction is a very saturated sector, whether you’re a large or small construction company, so marketing should be at the...
Tech9 years ago
Creating An e-Commerce Website
Tech9 years ago
Design Template Guidelines For Mobile Apps
Business4 years ago
What Is AdsSupply? A Comprehensive Review
Business8 years ago
The Key Types Of Brochure Printing Services
Law3 years ago
How Can A Divorce Lawyer Help You Get Through Divorce?
Tech6 years ago
When To Send Your Bulk Messages?
Tech3 years ago
5 Link Building Strategies You Can Apply For Local SEO
Travel12 years ago
Who Else Wants Also Nfl Hat