best casino bonuses australian online casino au dollars trusted online gambling internet casino download old information online us casinos las vegas best online casino craps flash casino games mac play online vegas

Get Our Newsletter



Links

Columnists



Site Search


Entire (RSS)
Comments (RSS)

Archive Calendar

April 2016
S M T W T F S
« Mar   May »
 12
3456789
10111213141516
17181920212223
24252627282930

Guides

How to Become a Bounty Hunter



Independent: How FBI’s iPhone Hack ‘Made Us All Vulnerable’

Apple logoBy Gus Hosien
The Independent

Since the horrific Brussels and Istanbul attacks we’ve all looked at our daily lives and saw vulnerability and risk. Where else could terrorists attack?

We begin to formulate security responses. CCTV, communication, surveillance, identity cards – they aren’t panning out. Perhaps we need to take things to the next level? How about we build an uber anti-terrorism system that grinds all our data together and identifies the people who wish to do us harm?

That uber-system has been built: it’s your smart phone. Health information? Apple Watch and other fitness trackers record your heart rate throughout the day. Financial information? Apple Pay and Google Wallet process your purchases. Locations? Your phone has recorded them all. Biometrics? You probably recorded your fingerprint, along with enough selfies too.

The FBI claimed that the iPhone, along with all of this information was impregnable. It decided to take Apple to court in order to access the phone – owned by the employers of Syed Rizwan Farook – one of the perpetrators of the San Bernardino terrorist attack in December.

This was a great PR coup for Apple. Apple’s systems were perceived as out of reach to the most powerful technology force in the history of humanity: the US Government’s intelligence and law enforcement community. However someone found vulnerability in Apple’s old mobile phone operating system, iOS8, and the agency has now admitted that it has accessed the device. The FBI has announced that it will not inform the tech firm how it breached the phone’s security features leaving millions of devices compromised.

To read more click here. 


Print This Post Print This Post

Write a comment

You need to login to post comments!