Apple Hacking Alert: IT Minister orders investigation, blasts Compulsive Critics

By Consultants Review Team Tuesday, 31 October 2023

The Union Minister for Communication, Electronics, and Information, Ashwini Vaishnaw, refuted any snooping claims related to the Apple threat alerts received by various INDIA (Indian National Development Inclusive Alliance) alliance members.

"The government is concerned about this issue, and it will get to the bottom of it," Vaishnaw told the reporters. We have already begun a thorough examination."

"I'd also like to point out that there are some obsessive critics in the country who have a habit of criticizing (the government) on every issue." They oppose the progress of the country," he added.

Ashwini Vaishnaw said that Apple has stated that its "threat notifications" have been delivered in 150 countries and that they may be "false alarms."

Many opposition figures have claimed that the federal government is attempting to 'hack' their phones and emails, including TMK MP Mahua Moitra, Congress MP Shashi Tharoor, Shiv Sena (UBT) MP Priyanka Chaturvedi, and Congress Working Committee member Pawan Khera.

"These attackers are likely targeting you individually because of who you are or what you do," Apple said in a warning. If a state-sponsored attacker compromises your device, they may be able to remotely access your sensitive data, communications, or even the camera and microphone."

Apple has yet to issue an official statement in response to the charges made by the opposition leaders. A "hack alert" is crucial in today's digitally connected world because it serves as an early warning system against potential cyber threats and breaches.

Why Hack alret has become imperative today?

As technology advances, so do the techniques and tactics of hackers. They constantly seek vulnerabilities in systems, networks, and applications, aiming to exploit them for various malicious purposes such as stealing sensitive information, spreading malware, or disrupting operations. A hack alert system monitors for suspicious activities, unauthorized access, or unusual patterns within an organization's IT infrastructure. It acts as a preemptive defense, allowing security teams to respond promptly and effectively, potentially thwarting an attack before it causes significant damage. 


Current Issue