1,090
22
Essay, 2 pages (300 words)

Essays park

Attackers havebeen targeting apple users due to the recent surge of popularity to Appleproducts in the market.

Apple’s responsible for about 13. 5% of smartphones and7. 5% of computers sold worldwide. The large number of Apple products meanshackers have more opportunities to attack them.

Some potentialthreats faced by the Apple product users are that many sensitive or importantinformation may be stolen by cybercriminals, which is why security researchershave also given a greater focus on vulnerabilities in Apple software, with somehigh-profile flaws uncovered in the year 2015. Zero-day brokers also offeredbounties for Apple vulnerabilities, a US$1 million paid for the jailbreak ofiOS 9. 1. Apple hasconfirmed that almost all of its products are affected by an intel bug that wasrevealed in the year 2018. That means that any of its consumers’ most sensitiveinformation could be potentially be read. But the exact nature of the problemis still not clear to the researchers and public, the danger is impossible toentirely be comprehended let alone have a head start of solving it.

The two bugs are known as Spectre and Meltdown. Meltdown can be patched up through an update, but could slow computers down asmuch as 30%. However, Spectre can’t easily be fixed, and will need computerchips themselves to be re-designed. The flaw means that malicious programmes canintercept that activity, even if it is not used often. A programme could seewhat else the chip has been doing through speculative execution, which mightinclude some personal and sensitive information. The simplest way to keep your iPhone safe andsecured is to update your iOS regularly.

Ensuring your operating system isrunning the latest software is the best way to make sure your devices are mostprotected from hackers. That’s because in each update Apple improves securityfeatures and fixes any previously overlooked weak points. Another way to keep your iPhone safe andsecured is to “ Be smart online, in messages, and when opening emails”.

An easywat many hackers get to a person’s iPhone information remotely is throughmalware links and email scams. An important rule that one should keep is toopen links, messages and emails from sources you trust only.

Thank's for Your Vote!
Essays park. Page 1
Essays park. Page 2
Essays park. Page 3

This work, titled "Essays park" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Essays park'. 28 September.

Reference

AssignBuster. (2022, September 28). Essays park. Retrieved from https://assignbuster.com/essays-park-essay-samples-28/

References

AssignBuster. 2022. "Essays park." September 28, 2022. https://assignbuster.com/essays-park-essay-samples-28/.

1. AssignBuster. "Essays park." September 28, 2022. https://assignbuster.com/essays-park-essay-samples-28/.


Bibliography


AssignBuster. "Essays park." September 28, 2022. https://assignbuster.com/essays-park-essay-samples-28/.

Work Cited

"Essays park." AssignBuster, 28 Sept. 2022, assignbuster.com/essays-park-essay-samples-28/.

Get in Touch

Please, let us know if you have any ideas on improving Essays park, or our service. We will be happy to hear what you think: [email protected]