Apple Nutrition protected from cyber attacks?

Apple App store was targeted because until now Apple is well placed to secure your store, 

US technology company Apple's popular App Store apps in dozens of millions of users from harmful virus can steal private information.

This cyber attack Apple's App Store in China has been affected and there is also the majority of users.
Cyber attackers how to move your code apps


Some users outside of China have been affected by it, and so far 50 applications could be threatened by the virus

Instead of targeting individual apps in the attack, a malicious code designed for the Apple tablet and the apps developed for use in air tools.

"X-Code" tool to develop applications companies and other large companies apparently used as a tool to cheat because it's faster than China Apple's version can be downloaded.
China is the problem






But with the help of mobile phones and tablet ID thief is
Relax and see the list on your mobile phone so that if you're not using the affected application. If so, delete it immediately. To develop this app, see the company's website and try to figure out how the app can be saved.
If you have unwanted messages or Apple phone or tablet access to the site is not so in this case the cloud and you will have to change passwords. This change their passwords potentially affected iPhone or tablet, rather than to any other computer.Who is behind the cyber attacks? 




Change passwords potentially affected your iPhone or tablet, rather than to any other computer
Yet it did not know about. We know that people who prepare hazardous materials for mobile phones are very active in China because of stolen phones are more attacks. The world's largest market for smart phones and therefore may affect the consumers. These cyber crimes to get money from a new phenomenon in many ways.
First it is targeted at consumers in large numbers. Millions of victims are due to administrative problems for the hacker who is committed to the virus used for financial gain.
So he selected a small group of users so that only people who have the information they can handle.
It is preferred that the assailants in the attack, but they wanted to keep the secret that mobile phones are the virus several weeks and months, they get progressively smaller amounts, equally such information which could later be sold or to be used in advertising.
Third, apparently hazardous X code has been posted on the gut hub. Gut Hub is the place where software developers can exchange their codes so that others can use it as needed to improve or change. It's funny because the malicious software developers who do not exchange its creation.
The code has been exchanged apologies with the message that 'X Code Ghost "in the incident which happened mazrt.as any problems that arise from questions harmful software or a fault.Why did they do that? 


Damage to the software that do not exchange it for its creation
So to make money: money to pay because most phone systems are linked in such a way so that criminals make money out of the way.
Apple's App Store was targeted because until now Apple is well placed to secure our store.
In addition, users of Apple's often the attacker to gain additional revenues which would have been consistent rumors especially the leaders of the security experts present unknown flaws in Apple's aprytnng system sold to governments.We know what to do about China's hackers?
We know that in any developed country like China very dynamic Here cyber crime hackers from harming the economy is very active. Also they do in other countries cyber crimes law enforcement agencies, which are difficult to catch them.
In addition, several large groups of hackers in China that pass this screen are cyber war. The Chinese cyber attacks of all types are beyond the border. China always denies backing cyber attacks. Internet in China to monitor government structure look like that even without the government's approval of the group can no activity.
It would be an embarrassment for the cyber attack a few days later, cyber crime, hacking and theft of industrial secrets in the case of China and the United States is going to hold diplomatic talks.

No comments:

Post a Comment