Skip to content

Is Your ο£Ώ iPhone Susceptible to Cyber-Hacking?

January 22, 2015

😎 An important question for the decade: Is Your ο£Ώ iPhone Susceptible to Cyber-Hacking… is Your Android SmartPhone subject to cyber-hacking? Better said:

😎 Your iPhones and Smartphones are Susceptible to Cyber-Hacking, the question is How Susceptible are they. There are definite Steps You may take to Minimize Cyber-Exposure.

😎 There are thousands of individuals globally, its been reported, spending their time creating malicious malware in attempt to Aggravating everyone. Some create malicious malware to gain intrusions to our privacy to be Annoying.

😎 Many Cyber Criminals imbed Malicious Malware, Spyware, Trojans, Worms and Viruses for more devious and devastating purposes namely: identity theft, monetary & property theft, break-ins & burglary, fraud, to mention a few.

😎 PRIMARY SOLUTION – Anti-Malware practice – Update your Operating System Promptly, once Apple’s iOS or Android’s Operating System Upgrades become available for DOWNLOAD. One of the primary components in Operating System Updates is the installation of the most current Anti-Malware algorithms, which is part of the OS update. Prompt OS updating is a very effective step in minimizing Malware Attacks.

😎 SECONDARY SOLUTION – Anti-Malware practice – ONLY Open or DownLoad Images, Videos, Objects, eMail from trusted Sources. Oftentimes Malware is imbedded or connected internally to eMail Attachments, or reside in Spurious Web-Sites where Worms and Trojans will wiggle into your hand-held device without you doing anything other than arrive at the Website page.

😎 Android Targeted by an astonishing 79% of all SmartPhone Malware, because it is more vulnerable to Viruses, according to U.S. Department of Homeland Security and FBI surveys. According to this survey the U.S. Department of Homeland Security and the FBI, uncovered by Public Intelligence, the majority of malware targeting mobile operating systems in 2012 was successful directly against Android devices, because its Operating System is highly fragmented rendering it more vulnerable to attack and has less Security Capability.

😎 Fragmentation of Android’s Operating System, is a major contributor to successful Malware attacks. Fragmentation generally is a phenomena where smartphone users either refuse to update, or intentionally elect not to update their smartphones’ operating system, OS, when new released are published.

😎 Most Smartphone users simply do not understand that smartphone OS updates contain Anti-Malware algorithms as well as improvements to the hand-sets’ general operation. Other smartphone users elect Not to upgrade their OS, as the Upgrade may cause their smartphone to Freeze, or many of its Apps may become inoperable.

😎 Fragmentation is Rampant with Android Users, because there are over 11,000 different android handsets models and brands in circulation, where older models do not have sufficient hardware capabilities, processors, memory, etc, to effectively install the Newer OS updates; Accordingly of Three Android users, only One-In-Three Android users update to the New Android Operating System. Conversely, TWO out of THREE Android Users do not Update periodically, therefore do NOT have the most current Anti-Malware software protection.

😎 Apple’s iPhones have some vulnerabilities too, but they were with the NSA according to a recently Declassified documents. The infamous former National Security Agency contractor Edward Snowden, responsible for leaking thousands of pages of classified intelligence documents from the NSA, the USA’s secretive spy Agency, reportedly believed that the iPhone contains “special software” that can be remotely activated by the NSA for intelligence gathering purposes.

😎 Apple was one of the first companies accused of participation in the NSA’s secret PRISM data mining initiative, following Snowden’s release of thousands of classified NSA documents. The PRISM project is said to have involved the extraction of “audio, video, photographs, e-mails, text messages, documents, and connection logs that enable analysts to track a person’s movements and contacts over time.”

😎 Apple immediately denied the accusation, saying that they “have never heard of PRISM” and that “Apple does not provide any government agency with direct access to our servers.”

😎 The “Snowden leaks” revealed that NSA had created spyware targeted at SmartPhones and iPhone, which would have given intelligence services access to SMS messages, on-board data, live microphone feeds, and GPS and WiFi location-positioning information. It remains unclear how successful the program was.

😎 Apple vehemently denied any involvement, and recently announced that its iOS software has been, and continues to be periodically updated make absolutely certain that iPhones and iPads are protected with the latest Anti-Malware software, and to assure that there are “No Back Doors for entry into one’s iPhone.”

😎 Apple Confirmed it has never worked with the NSA to create a “backdoor in any of our products, including iPhone,” the company said following news of the project. “Additionally, we have been unaware of this alleged NSA program targeting our products. We care deeply about our customers’ privacy and security.”

😎 Android’s lack of security is due to "Android Operating System Fragmentation" as more than 50% of Android users are using Older OS Versions, for fear of having their smartphones or its Apps become inoperable, even though these users are significantly more Vulernable to Viruses, Worms, Trojans, Spyware, and Malware. Newer versions of Android have become more secure, but the user-base is not updating to the new version. There are over 11,800 different Android devices in operation today. Android simply cannot keep up with their Operating System vulnerabilities, nor can the Android designers convince their users to upgrade, which would protect many of them.

😎 Security Vulnerable to Viruses, Worms, Trojans, Spyware, and Malware is Very Serious Business. These days we have more Confidential Identity information, Bank Accounts, Passwords, Emails, Test Messages, than in any other single device. Keeping our personal information safe and secure is extremely important, perhaps even more important than on our PC computers. Reports such as this among other safety concers are likely the reasons that Apple is spending millions of dollars and thousands of hardware-software engineering hours to protect its iPhone customers.

😎 According to a survey conducted by the U.S. Department of Homeland Security and the FBI and uncovered by Public Intelligence, the majority of malware targeting mobile operating systems in 2012 was intended for Android. Indeed, Android was targeted by an astonishing 79 percent of all smartphone malware. The following is an excerpt from the Unclassified report from a survey conducted by the U.S. Department of Homeland Security and the FBI.

😎 (U//FOUO) Android mobile operating system (OS) continues to be a primary target for malware attacks due to its market share and open source architecture.

😎 Industry reporting indicates 44% of Android users are still using versions 2.3.3 through 2.3.7-known as Gingerbread, which were released in 2011, and have a number of security vulnerabilities that were fixed in later versions. The growing use of mobile devices by federal, state, and local authorities makes it more important than ever to keep mobile OS patched and up-to-date. The following are some known security threats to mobile OS and mitigation steps.

😎 Android was targeted by an astonishing 79% of all smartphone malware that year far more than any other OS. The agencies found that Apple’s iOS was targeted by 0.7% of malware attacks, Windows Phone and BlackBerry by 0.3% and Symbian OS by 19%.

😎 DHS and FBI note in their memo, citing the research circulated nationwide to law enforcement, security and emergency personnel, that a significant number of Android users continue to run older versions of the OS that leave them open to a number of security vulnerabilities β€” something companies with rival operating systems love to point out.

😎 Recall that over 94% of Apple iOS users, about 400 million of them, have updated to the iOS7 and iOS8 which contains the latest Protection against Security Vulnerable to Viruses, Worms, Trojans, Spyware, and Malware. This is largely why Apple’s iOS has experienced less than 1% of such vulnerabilities.

Pleased you’re reading, with about 75,000 readers world-wide, growing by thousands each month, giving motivation as new topics are published every day. Spread the Word to your friends, family, and associates; Forward the link below, post it on Facebook, Twitter, LinkedIn, Social Networks for their review,, Anyone may subscribe, its secure and confidential; Every time I publish an article, WordPress will send a reminder (no Ads of course) with a link to my new Article:

Perspective: These articles are created to inform a diverse audience, whether it be photography, digital cameras, lenses, Image editing, Apps, Smartphones, iPads, iPhones, Laptops and related products, Health & Wellness, or any news-worthy topic. The purpose is to inform, from sources that are believed to be reliable, and stimulate Dialogue.

To learn more about what else we do, take a moment and visit these links, browse around. We are pleased with over 25,900,000 visits as of January, 2015:

If digital Imaging is of interest, I teach a course named "Principles of Digital Imaging and Post Image Processing" as an Adjunct Prof at FAU:

When I do what I do… I usually do it here.

As a "Health Nut" for Health & Wellness;

As many of my friends, family and students know, I am an avid iPad adopter since its release April, 2010. With Apple’s release of the Retina-Display iPad Air 2, (I sold iPad 4 to applied the proceeds to purchase the "mini" with 128GB of Storage, AT&T connectivity, plus added Logitech’s UltraThin Keyboard Cover, and a DECODED natural leather thin slip-over protective case.

Leave a Comment

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: