Security issues and data breach with iCloud
A major setback for Apple’s reputation came this week when hundreds of nude celebrity photos were leaked from iCloud and posted on 4chan (an image-sharing forum). This news reached the newsletter as it involved celebrities such as Jennifer Lawrence, Ariana Grande and the FBI is investigating this matter. The news has drawn mixed reactions on social media forums, with few blaming celebrities for taking their compromising photos and others blaming poor data security on iCloud, Apple Inc.’s cloud computing service for storing images. , music and data.
Apple set out to have engineers detect the cause and fix the breach in its security, denying that its security measures were flawed, as only a few celebrity accounts were attacked. The discovery made in the investigations suggests that the hackers used usernames, passwords and mainly information for security questions to unlock their accounts. Unlike other services that lock it after some tests with a wrong password, Apple’s “Find My iPhone” feature allowed hackers to run unlimited password tests using the concept of “brute force attack”.
What sparked more speculation was the fact that a day before this leak, code for Apple’s brute force technique was uploaded to GitHub, a web hosting site. However, Apple has fixed this issue and states that no violation has occurred in Apple’s “iCloud” or “Find My iPhone”. To avoid such attacks, Apple recommends using a strong password with two-step verification.
It is not confirmed whether Apple’s security flaw was the reason for the leak of celebrity photos. High-profile participation and media interest have left a black mark on Apple. Especially with the official launch of the iPhone 6 and its first smartwatch due out shortly, it makes you wonder if this scandal was really a strategy.
Avoid data theft
Data in the cloud is often at higher risk of being stolen. In relation to the current situation, it would be advisable not to store extremely private information in the cloud, especially without ensuring adequate protection of your account. Avoiding common passwords and setting up a two-step verification procedure is the way to go.
Cloud systems make information management easy and simple, but they also have drawbacks. It can be inconvenient to take extra care steps, but ultimately, a little attention goes a long way. It is evident from this incident that prevention is definitely better than cure.