With the growth and development of modern technology what also increased in leaps and bounds are the ways and means to misuse it. The scientific advancements are not without its curses. People with wrong motive use these for their selfish ends. Computer hackers are one such cyber thieves who, by using their modern technologies can steal valuable information from electronic devices of other people.
Focusing on this security issue, Apple recently launched a new defense mechanism to protect the electronic devices and safeguard the valuable personal information of the users- like the bank account number, passwords and credit card numbers. The mechanism would also act as a shield from unauthorized viewing of contact information, emails. Apple received a warning for such a crisis earlier this year from three scientists.
Yeongjin Jang and Chengyu Song, two graduate pupils and a research scientist from Georgia Institute of Technology, Billy Lau has been working to resolve the issue. The three of them demonstrated security susceptibility and their research result at the convention held on Wednesday in Las Vegas. After the said hacking convention of Black Hat, almost as many as seven thousand security personnel are going through a period of training on the threats of modern day cyber hackers and the strategies to overcome them.
While explaining their research in the Las Vegas meet the trio gave a complete demonstration of their study and their findings. They connected an iPhone with a customized charger attached to a computer that is automated to attack the iOS gadget and it did. Thereby proving their point.
The research results are expected to be made public by autumn of this year. Until then the problem would persist. The security up gradation targets iPhones and iPads, which are mostly affected when the user connects it to the fake charging station. The new software version is known as iOS 7 that has been provided to the software developers for further analysis and security check. However, the operating system for the Android is not prone to these kinds of attack. As the users are automatically warned of the presence of a bug as soon as they connect their device with a computer, serving as a charging agent.
The latest beta iOS 7 is guaranteed to serve a two-way purpose namely, as a protector of the software from any unlawful activity and it is expected to become a spying tool for the user. Prevention is better than cure –the Apple researchers seem to comprehend that lately- a scientist commented that right now they are focusing on discovering the security bug, which will enable the company to fix them even before the criminals can detect them and take advantage. Billy Lau opined that the best way to solve a problem is not to shut it down but to discuss it openly. As the criminals of the cyber world are growing smarter day by day. Truly, it is always not very easy to identify them. What we can do is to be on our safeguard as much as possible. The best way is to discuss it frankly and adopt safety measures.
The Impact of Covid-19 on Commercial Property
The lives of people all over the world have been completely altered as a result of Covid-19, with businesses struggling...
3 Of The Best Foods and Drinks To Aid Your Sleep
Getting a good night’s sleep is hugely important for your overall health and wellbeing. Studies have shown that having a...
Why You Should Consider Volunteering
Volunteering has many benefits both to you, your community, and your CV. Whether you do it alone, or with a...
Investigating The Important Factors In Legal Software Testing
Fulfilling the digital transformation objectives with QA testing services has become an important phase for all industry verticals. Today, every...
Multiply Your Magento Store’s Sales With Affiliate Program
Are you struggling to boost your sales and expand your customer base due to the significant increase in marketing expenses?...
How COVID-19 Is Changing Plastic Surgery
There’s been changes to practically everything in our everyday lives, including industries such as plastic surgery. With practices having to...
Benefits and Drawbacks Of Getting A Taxi and Renting A Car
If you’re planning a vacation or business trip, you must decide whether or not to rent a car ahead of...
8 Killer Tips to Make Your Portfolio Website Standout
A portfolio website is one of the easiest and most straightforward ways to showcase your work. Although you have a...
3 Reasons You Need A Mobile-Responsive Email Marketing Platform
Repeat after me. Creating email interfaces with mobile-first ethos and UI is key to the success of email marketing campaigns....
Mother and Nature Active Maternity Wear, How It All Started
5 months pregnant and very happy about it, not much to complain about. Everything was going ok (famous last words). ...
How To Make Sure Your Toddler Has A Balanced Diet
As your baby grows into a toddler, they go through a period of intense mental and physical development, as their...
The Top 3 Vitamins and Minerals To Support Your Fitness Goals
You can spend hours in the gym, but without fuelling your body properly, it will be hard to see the...
Best Cities To Invest In Real Estate Across The UK
If you’re looking to invest your money, real estate has historically offered a safe investment with good returns. You gain...
7 Ways You Can Power Your House
In case you are remodeling your home and are considering a more eco-conscious approach, you are probably looking into various...
The Pro’s and Con’s Of Chemical Peels
A chemical peel is a non-surgical cosmetic procedure that resurfaces the skin to give it a refreshed, soft and smooth...
- Tech6 years ago
Creating An e-Commerce Website
- Tech6 years ago
Design Template Guidelines For Mobile Apps
- Business5 years ago
The Key Types Of Brochure Printing Services
- Travel8 years ago
Who Else Wants Also Nfl Hat
- General5 years ago
Kobe Bryant With His Unique Nba Jerseys
- Tech6 years ago
Why Small Businesses Can't Ignore Mobile Technology
- Tech6 years ago
Climb Google Using These Checklists
- Health7 years ago
Health Supplements For Sports Activities Nutrition