Home Business IT Security Apple won’t give the keys to its orchard to anyone
Apple won’t give the keys to its orchard to anyone Featured

Apple, makers of the ubiquitous iPhone have rejected a US magistrate's court order to assist the FBI to access potentially terrorist related information on an iPhone.

Apple CEO Tim Cook says it is being asked to "hack its own users" and is prepared to take the matter to the highest court – a move that may take years, lots of time and money.

Analysts are saying Apple is in between a rock and a very hard place. On one hand, the American people may get antsy about Apple protecting the rights of a dead ISIS terrorist over the security of the American people – according to Arkansas Republican Senator Tom Cotton.

On the other hand, it could be the most monumental fight for individual privacy ever seen. Apple certainly have the resources, and likely the resolve, to take on the Government.

The Government party is the equally well-funded and well-resourced Federal Bureau of Investigation (FBI) and it could also appeal any order that Apple obtains to reverse the magistrate’s decision. This could get messy.

Cook has penned a letter to Apple’s customers that you should read. His points make sense – it sets a dangerous precedent to ‘remove security features and add new capabilities to the operating system’ allowing iPhones to be unlocked by brute force [password cracking].

Cook says all that information needs to be protected from hackers and criminals who want to access it, steal it, and use it without a user’s knowledge or permission. Customers expect Apple and other technology companies to do everything in thier power to protect a user's personal information, and Apple is deeply committed to safeguarding users data.

iTWire will continue to report on this issue as more information comes to hand.

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect