With the growth and development of modern technology what also increased in leaps and bounds are the ways and means to misuse it. The scientific advancements are not without its curses. People with wrong motive use these for their selfish ends. Computer hackers are one such cyber thieves who, by using their modern technologies can steal valuable information from electronic devices of other people.
Focusing on this security issue, Apple recently launched a new defense mechanism to protect the electronic devices and safeguard the valuable personal information of the users- like the bank account number, passwords and credit card numbers. The mechanism would also act as a shield from unauthorized viewing of contact information, emails. Apple received a warning for such a crisis earlier this year from three scientists.
Yeongjin Jang and Chengyu Song, two graduate pupils and a research scientist from Georgia Institute of Technology, Billy Lau has been working to resolve the issue. The three of them demonstrated security susceptibility and their research result at the convention held on Wednesday in Las Vegas. After the said hacking convention of Black Hat, almost as many as seven thousand security personnel are going through a period of training on the threats of modern day cyber hackers and the strategies to overcome them.
While explaining their research in the Las Vegas meet the trio gave a complete demonstration of their study and their findings. They connected an iPhone with a customized charger attached to a computer that is automated to attack the iOS gadget and it did. Thereby proving their point.
The research results are expected to be made public by autumn of this year. Until then the problem would persist. The security up gradation targets iPhones and iPads, which are mostly affected when the user connects it to the fake charging station. The new software version is known as iOS 7 that has been provided to the software developers for further analysis and security check. However, the operating system for the Android is not prone to these kinds of attack. As the users are automatically warned of the presence of a bug as soon as they connect their device with a computer, serving as a charging agent.
The latest beta iOS 7 is guaranteed to serve a two-way purpose namely, as a protector of the software from any unlawful activity and it is expected to become a spying tool for the user. Prevention is better than cure –the Apple researchers seem to comprehend that lately- a scientist commented that right now they are focusing on discovering the security bug, which will enable the company to fix them even before the criminals can detect them and take advantage. Billy Lau opined that the best way to solve a problem is not to shut it down but to discuss it openly. As the criminals of the cyber world are growing smarter day by day. Truly, it is always not very easy to identify them. What we can do is to be on our safeguard as much as possible. The best way is to discuss it frankly and adopt safety measures.
Sparks and Smoke: 6 Signs Your House Needs Rewiring
If you bought an existing home, it’s likely the wiring was done a long time ago. Over the last few...
Master Mechanic: How to Learn More About Your Vehicle
Driving a vehicle on a regular basis is one thing. Understanding how it works, however, is a whole other ball...
Tips to choose packers and movers to help move your office space
Numerous moving companies in India help make your move to any city as smooth as possible. They offer quality and...
Enjoy Responsibly: The Safest Methods for Using Cannabis
As cannabis is becoming more and more legalized across the nation, people are becoming more curious about its uses. With...
Tips on finding moving companies in Toronto providing comfortable moving services
Moving to an interstate location shall be stressful, especially if you are about to relocate on your own. Hiring professional...
Choosing the Right Tail Lights for Your Car or Bike
If you need new tail lights for your car or bike, you’ll want to take several factors into consideration so...
End of lease cleaning in Melbourne – Move in and Move out easily
If you are a tenant, you are sure to be aware of the fact that you get to move into...
Tips in finding a trustworthy removalists team in Sydney
Relocating to a newly rented or leased house space can be a tedious and time-consuming process to perform on your...
4 Fashion Additions to Complete Your Outfit
A wonderful outfit can make you appear and feel like someone who can conquer the world without even breaking a...
How to Go about Selling an Old Car for Parts
Selling an old car for parts is easier than most people realize, and your junker could be worth quite a...
4 Things to Consider Before Choosing a Feed Tank for Your Manufacturing
In every day manufacturing you may find that you need a feed tank for your operation. Selecting the right feed...
How to Find a Phone that Fits your Needs
Are you looking to buy a phone that may suit your needs without poking a hole in your wallet? You...
Elegant Dinner: 4 Ways to Fancify Your Next Get-Together
Throwing a social gathering in the comfort of your own home can be a joy. If you want your upcoming...
5 Issues You May Face in the Aftermath of an Auto Accident
Being involved in a motor vehicle accident is something we all would like to avoid. However, no matter how safe...
5 Ways Guest Posting Can Help Grow Your Online Audience
Guest blogging is the process of posting your original content on someone else’s website. This might seem like a counterproductive...
- Tech4 years ago
Creating An e-Commerce Website
- Tech4 years ago
Design Template Guidelines For Mobile Apps
- Business4 years ago
The Key Types Of Brochure Printing Services
- Travel7 years ago
Who Else Wants Also Nfl Hat
- General4 years ago
Kobe Bryant With His Unique Nba Jerseys
- Tech4 years ago
Climb Google Using These Checklists
- Tech5 years ago
Why Small Businesses Can't Ignore Mobile Technology
- Health6 years ago
Health Supplements For Sports Activities Nutrition