247 Detectives

Please Call NOW 0845 520 4121 / 07017 411 007

Please Call NOW 0845 520 4121 / 07017 411 007

Content Area 1

1st Call Detectives Blog

Get the latest information & news from the industry...

Archive +

Tags

Archive by Date

Apple opens up its iOS kernel to improve security

by Josef Kafka

While the Apple vs FBI arguments may be simmering down in the States, US politicians are still debating the issues within the wider context of international relations, business and security (http://www.bloomberg.com/news/videos/2016-06-23/sec-kerry-on-china-cybersecurity-apple-vs-fbi). Considering the drive from the technology firms to keep government and other snoopers out is to encrypt everything, Apple's latest move is a rather surprising one. In the latest development on the IT side, Apple has taken to decrypting the kernel, the core code, within the latest version of iOS. 

The new iOS 10 release comes with accessible code, allowing programmers to see the heart of Apple's software and report any security weaknesses. While this may create a few new ways for hackers to attack users in the short term, in the longer term it will make the operating system more secure. This change in approach also prevents Apple engineers from feeling complacent about their code, which they might have believed to be ultra secure thanks to the use of encryption. Apple remains confident that everything else, including user data, will be safe once the new iOS is released on the latest iPhone and iPad devices later this year.

Businesses are adopting encryption fast! 

Out in the business world, the use of encryption has rocketed as users and IT departments finally realise the risks that unencrypted data and communications poses. According to a survey, only 16% of large companies used encryption back in 2005. That figure rose steadily to around 34% in 2014 while the latest report (http://www.csoonline.com/article/3088916/data-protection/study-encryption-use-increase-largest-in-11-years.html) shows a large leap up to 41%. This still leaves an alarming 59% of companies exposing their, and possibly your, data to hackers or governments, but expect the number of businesses using data protection measures to grow rapidly until they become standard.

That positive trend still doesn't help the huge number of companies being hacked due to weak security, poor network controls, lack of encryption, falling victim to social engineering tricks and other errors. With so many targets and so many hackers, there is a never-ending stream of attacks being aimed at all businesses and individuals. Only by keeping their protection up to date and actively investing in the latest data protection, using VPNs, 256-bit SSL and HTTPS can companies stand a reasonable chance of remaining attack-free. Considering that just one rogue program on a single PC can infect an entire business network, the need for education and constant vigilance from all users is incredibly important.

A new wave of hacks and attacks

The latest hack saw over £40 million stolen from a bitcoin-based investment fund, called the Decentralised Autonomous Organisation (http://www.bbc.co.uk/news/technology-36585930). These online-only crypto currencies are potentially the future for money, but few people will accept them into their lives when such huge sums can be stolen electronically, and with no real world recourse to compensation or much hope of finding the criminals.

Another new threat that could affect anyone is a ransomware tool called RAA that's turning up in emails. As a Javascript code (http://www.bleepingcomputer.com/news/security/the-new-raa-ransomware-is-created-entirely-using-javascript/), it can steal your data and only return it for a $250 fee, as well as try and steal any passwords on your system. Consider that before you decide to open up any random attachment sent to you by email. Unfortunately, the ransom demand is in Russian, so typical victims might have a hard time figuring out what do to. 

Other attacks against websites and online services have seen a host of these businesses having to automatically reset users' passwords to prevent illegal access. However, since many of us still use one or a few passwords on a huge range of sites, the risk to us of other accounts being accessed exists. The likes of social network MySpace, remote access service GotoMyPC and others are the latest victims of massive password thefts. As users, at the very least, we should have different passwords for financially sensitive sites compared to those we use on social media and other services. 

All of these issues and hacks continue to highlight the need for constant vigilance from users when it comes to protecting our data, communicating online, or passing our credentials and information out. They should remind all users to increase their use of security tools, ensure encryption is enabled and be more aware of threats. This can mean ensuring all websites use HTTPS:// headings to ensure a secure link between the user and a website, as you'll see on our own site and checking the technology news to understand what the latest weaknesses are, and if you may be affected. 

Whatever computers or mobile devices you use, ensure you keep your data safe and secure. Do so through enabling all the security features on the device, ensuring you use strong passwords and only opening files from trusted sources. Taking any other course of action is not worth the risk of having all your details stolen.

Leave a comment
Areas & Postcodes We Cover
  • NW7, NW9, NW4, NW11, NW2, NW10, NW6, NW3, NW8, NW5, NW1, N20, N12, N3, N2, N10, N6, N8, N19, N7, N1, N5, N4, N16, N15, N17, N18, N11, N14, N21, N9, N13, N22 
  • E4, E17, E18, E5, E10, E11, E8, E9, E2, E1, E14, E3, E16, E6, E13, E15, E7, E12, SW6, SW10, SW5, SW7, SW3, SW1, SW14, SW13, SW15, SW20, SW19, SW18, SW17, SW16, SW12, SW2, SW9, SW8, SW11, SW4
  • EC4, EC1, EC2, EC3, SE1, SE11, SE17, SE16, SE5, SE15, SE14, SE8, SE24, SE22, SE4, SE21, SE23, SE26, SE20, SE25, SE19, SE6, SE12, SE9, SE18, SE2, SE28, SE7, SE10, SE3, SE13 
  • W1P W1M W1N W1R W1S W1T W1U W1V W1W W1X W1Y W1K W1J W1H W1A W1B W1C W1D W1F W1G W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
     
  • © All rights reserved 2014 '1st Call Detectives'
  • /
  • Website designed & devloped by evokeu