Apple Confirms iPhone Source Code Leak
Recently Apple confirmed that some parts of the source code for their iOS mobile operating system have been leaked online. The part of the source code used for iOS9 operating platforms was freely posted on a code-sharing website, Github.
Apple keeps the source code of iOS private and they ordered Github to remove the content. Experts believe that the leak has not compromised security. In a statement released by Apple, iPhone was not relying on “the secrecy of its source code”. They also stated that they are encouraging their customers to make regular updates of their operating system.
Luckily, 93% of Apple users are using iOS 10 or above and these devices do not use the leaked code.
The leaked code, called iBoot, began with the statement: “This document is the property of Apple Inc. It is considered confidential and proprietary.”
Prof Alan Woodward, a Cyber-security expert from the University of Surrey, said: “The source code for a company’s operating system is like the crown jewels – it is guarded very well.”
Security experts said that hackers will probably study the code now to see if it has any flaws which might make an unauthorized access possible. However, if there is nothing wrong with the code, it doesn’t matter that it’s available online.
Is Social Media Causing Depression?
There is plenty of evidence between social media and mental ill-health, especially among young people.
According to Dr. Chatterjee: “Social media is having a negative impact on mental health. I do think it is a big problem and that we need some rules. How do we educate society to use technology so it helps us rather than harms us?”
A group of child welfare experts from the US recently wrote to Mark Zuckerberg, Facebook founder, urging him to shut down Messenger Kids, which is a messaging app developed for children. Due to social media, children as young as 10 have body image issues because of all the images they are bombarded with on the platforms such as Instagram and Facebook.
According to a study from 2017 by The Royal Society of Public Health, Snapchat and Instagram were the most likely to cause anxiety and a feeling of inadequacy among young people, while YouTube had the most positive impact on young people. Furthermore, two-thirds of participants of the study said that Facebook makes cyberbullying even worse.
Dr. Theodosiou explained why social media is a great platform for bullies: “At school, any offline bullying would be limited to that environment but on the computer at home it begins to feel like you are being bullied in your own bedroom.”
What can we do as parents? We should keep an eye on how much children spend online, consider bans an hour before bedtime or during mealtime; talk to children about social media and online behavior and encourage children to use the internet for useful and creative things.
Hackers Hijack Government Website
The Information Commissioner’s Office (ICO) had to take down its website after they were warned that hackers took control of visitors’ computers to mine cryptocurrency. According to Scott Helme, a security researcher more than 4000 websites were affected including many government websites. At the moment, the affected code has been disabled and visitors to those websites are no longer at risk. Mr. Helme said that he was warned by a friend who informed him that he has received a malware warning after visiting the ICO website.
Mr. Helme traced the malware issue to a website plug-in, Browsealoud, which is used to help blind or partially sighted people to access the internet. The company which creates the plug-in, Texthelp, said that the product was affected for a few hours by a code designed to create and generate cryptocurrency.
Who is involved?
Monero, a rival to Bitcoin, designed to make transactions which are untraceable to the senders and recipients.
The plug-in was designed to add a program which “mines” on visitors’ computers generating and collecting any potential cryptocurrency.
Mr. Helme said: “This was a very serious breach. They could have extracted personal data, stolen information or installed malware. It was only limited by the hackers’ imaginations.”