Should Apple Credit Card Feature be Trusted

P { margin-bottom: 0.08in; }

After
the photo scandal in which prominent Hollywood stars such as Jennifer
Lawrence private pictures were stolen by hackers and uploaded on the
internet, Apple is hell bent on doing the marketing that is primarily
focus on damage control. Tim Cook Apple’s CEO wrote:

P { margin-bottom: 0.08in; }

“Security
and privacy are fundamental to the design of all our hardware,
software, and services, including iCloud and new services like Apple
Pay. And we continue to make improvements. Two-step verification,
which we encourage all our customers to use, in addition to
protecting your Apple ID account information, now also protects all
of the data you store and keep up to date with iCloud



I
want to be absolutely clear that we have never worked with any
government agency from any country to create a backdoor in any of our
products or services. We have also never allowed access to our
servers. And we never will.”

P { margin-bottom: 0.08in; }

If
we look at the statement Tim have highlighted two things. First he is
advocating about improvement and security of the new service ‘Apple
Pay’. We do need to keep in mind here that Apple’s current breach
is still under investigation and until the causes of the breach are
determined Tim’s claim cannot be taken seriously.



Second
he is telling his loyal customers that Apple never share any
information nor have any secret contracts with the government. But in
the past Apple has cooperated with government investigations by
turning over individual users’ data. We know that Edward Snowden’s
leaks revealed in June 2013 that many tech companies assist
government investigations by turning over suspects’ data. Good for
Apple’s CEO that he realized this after one year and coming clean
on this.



Apple
Pay

 



The
Apple Pay includes near-field communication technology or NFC, which
allows for the transfer of small amounts of data between two devices
held closely to one another. The payment will be done by giving your
biometric finger signature, the database of which is obviously stored
on remote servers. Apple did not go into any detail describing the
security measures of Apple Pay. 
 



Apple
Pay is no doubt a big threat for conventional payment systems, but
regular users of iphone cannot just blindly put trust on this system.
The wise thing therefor for them if they are not tech savvy is not to
adopt the technologies such as Apple Pay and others of similar type
for some time. Therefore wise thing for regular users who are not
tech savvy is to observe how the new entrant is performing.

Image Credit

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Blind SQL Injection Tutorial to Hack a Website

In the previous article, we have the basics of SQL Injection; what SQLi is and what are the types of SQL injection. And, In...

What is SQL Injection? Tutorial: Type and Example

What is SQL injection, and what are the types of SQL injection? These are the common questions, and we will seek the answer to...

Are Cisco 300-410 Exam and Its Related Certification Your Pathway to Career Success? Find Out about This

Introduction Career success can mean different things to different people. For some, it could mean having a prestigious title and for others, it could be...

How to Hack Windows 10 Password Using FakeLogonScreen in Kali Linux

This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic and...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.