Apple iPhone 8 Plus screen split open while charging: Report

Agencies
September 30, 2017

San Francisco, Sept 30: A user from Taiwan claimed her iPhone 8 Plus, which belongs to Apple’s latest line-up of devices, split open while it was charging. “So far, the finger of blame is being pointed at the battery. Unconfirmed reports state the iPhone 8 Plus uses the same battery manufacturer, Amperex Technology Limited (ATL), as the Samsung Galaxy Note 7”, The Next Web reported late on Friday. The screen of the device bulged out five days after the user purchased it.

The woman had purchased a 64GB “Rose Gold” iPhone 8 Plus and she put it on charge, using the supplied cable and adaptor. “After about three minutes, she reported seeing the front panel bulge, and eventually lift completely from the device”, the report added.

The Cupertino-headquartered giant is currently investigating reports of iPhone 8 Plus splitting open and the reason remains unclear as of now.

Similar reports have emerged from Japan where one owner claimed his phone arrived in a state with the screen visibly detached from the body. However, there have been no reports of visible evidence of burn marks.

Apple iPhone 8 and iPhone 8 Plus were made available from September 22 in the US, Australia, Canada, China, France, Germany, Hong Kong, Singapore, United Arab Emirates, the UK and other countries.

Apple launched iPhone 8 and iPhone 8 Plus, starting at Rs 64,000, in India on Friday while pre-bookings had started on September 22. The iPhone X will arrive in India on November 3, starting at Rs 89,000.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 13,2020

Amid the rapid spread of the novel coronavirus (COVID-19), which has infected 73 people in India and killed more than 4,500 individuals globally, doctors have advised that in addition to regularly washing hands, one should also disinfect their smartphone every 90 minutes with alcohol-based hand sanitizer.

Ravi Shekhar Jha, Head of Department at Fortis Escorts Hospital in Faridabad said the best method to disinfect your smartphone is to use regular doctor spirit or the alcohol-based hand sanitizer at least every 90 minutes.

"Avoid touching your eyes, mouth, or nose. The best option is to use a phone cover or a Bluetooth device and try to touch your phone as less as possible. We would also recommend cleaning your phone at least twice a day," Jha told IANS.

According to research, published in 2018 by Insurance2Go, a gadget insurance provider, revealed that smartphone screens have three times more germs than a toilet seat.

One in 20 smartphone users was found to clean their phones less than every six months, said the study.

"In the time of fear of coronavirus, smartphones should also be disinfected with alcohol-based sanitizer rub. Pour few drops of sanitizer on a tiny clean cotton pad and rub it safely on your entire phone," said Jyoti Mutta, Senior Consultant, Microbiology, Sri Balaji Action Medical Institute in New Delhi.

"You can repeat this process every evening coming back home after an entire day out at work and once in the morning before going out," Mutta added.

"Maintain basic cleanliness, and try to avoid using other's phones especially if suffering from respiratory illness or flu-like symptoms as there is no other way to disinfect these regular gadgets," she stressed.

Another study from the University of Surrey in the UK, also found that the home button on your smartphone may be harbouring millions of bacteria - some even harmful.

The World Health Organisation (WHO) declared the novel coronavirus as a global pandemic on Wednesday. The death toll of COVID-19 has crossed the 4,500 marks and confirmed cases globally have touched one lakh as per the reports.

According to Suranjeet Chatterjee, Senior Consultant in Internal Medicine Department of Indraprastha Apollo Hospitals in New Delhi, "We should frequently wash our hands, cover our coughs and it is important to adapt to other good hygiene habits that are most important in such a situation."

"Coronavirus and other germs can live on surfaces like glass, metal or plastics and phones are bacteria-ridden. It is necessary that we sanitize our hands frequently and make sure that our hands are clean all the time," Chatterjee told IANS.

"The emphasis should be laid on sanitising our hands rather than sanitizing the phone - once in a while the phone can be sanitized under the guidance of the makers of the phone," Chatterjee stressed.

According to the global health agency, the most effective way to protect yourself against coronavirus is by frequently cleaning of your hands with alcohol-based hand rub or washing them with soap and water.

The WHO's report showed the virus infects people of all ages, among which older people and those with underlying medical conditions are at a higher risk of getting infected.

People should eat only well-cooked food, avoid spitting in public, and avoid close contact, the WHO said, adding that it is important for people to seek medical care at the earliest if they become sick.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.