The Labor Day Weekend has been awash with media reports of nude photos leaked online by a hacker who allegedly broke into Apple iCloud accounts.
Actress Jennifer Lawrence and supermodel Kate Upton are two of many female celebrities who have been victimized.
Media reports Monday say that Apple appears to have fixed a bug that some experts have speculated could be the source of the massive hack of private photos. The bug, known as “ibrute,” allowed hackers to access a person’s iCloud data by exploiting a weakness in Apple’s “Find My iPhone” service, according to Engadget.
Many consumers with highly-sensitive data on the “cloud” do not understand how these sites work, and they may not even realize they’re on the cloud, experts say. People associate iCloud with just being part of any Apple device, which is true. But it is not as simple as downloading the Facbook app or looking for the latest album on Apple music. For something like iCloud, it is best to do your research into it before creating an account. It is best to know whatever you have on your phone will be backed up onto the cloud when you have signed into it. These are the aspects that people forget about. If you are not too sure on the idea of your personal files being hacked or the whole concept of the cloud, you may want to look into a site like https://www.salesforce.com/what-is-cloud-computing/, so you can at least understand the basic idea.
The iCloud breach on 31 August 2014, has made people have been very sceptical of storing their precious information online and have been purchasing services from businesses like www.thefinalstep.co.uk instead to protect their data from any hackers.
“A lot of people don’t understand how far their information is spreading,” Clifford Neuman, the director of the USC Center for Computer System Security, told ABC News. “There’s a lot more stuff that gets sucked into these sites than one would understand.”
For example, if you have Google Drive via a gmail account, or Dropbox, you are on the cloud. So if a hacker can figure out your gmail password, he or she would be able to access everything in your Google Drive account.
Additionally, when you sync a device like your smartphone to the cloud, it creates two copies of files. If you delete something from a device like a tablet or smartphone, it doesn’t necessarily delete from the cloud.
In many cases, you still have to go into the cloud account and delete it.
Another big problem is weak passwords. This is the biggest gateway for hackers into any personal account. Many consumers use the same password for multiple accounts, and sometimes this password is not very strong.
If one of your digital accounts is hacked, and you’re using the same password for your cloud account, then it’s a no-brainer for hackers to also gain access to your cloud.
You should be using a different password for your cloud account than you do for other accounts,” Neuman said.