Technology

Security issues and data breach with iCloud

A major setback to Apple’s reputation occurred this week when hundreds of nude photos of celebrities leaked from iCloud and were posted on 4chan (an image-sharing forum). This news made it to the newsletter as it involved celebrities like Jennifer Lawrence, Ariana Grande and the FBI is investigating this matter. The news has drawn mixed reactions on social media forums, with some blaming celebrities for taking their compromising photos and others blaming the poor data security of iCloud, a cloud computing service from Apple Inc. for storing images, music and data.

Apple went to work with engineers to find the cause and fix the breach in its security and denied that its security measures were flawed as only a few celebrity accounts were hacked. The discovery made in the investigations suggests that the hackers used usernames, passwords and mainly security question information to unlock their accounts. Unlike other services that lock you out after a few attempts with an incorrect password, Apple’s “Find My iPhone” feature allowed hackers to perform unlimited password tests using the concept of “brute force attack.”

What sparked further speculation was the fact that a day before this leak, code for Apple’s brute force technique was uploaded to GitHub, a web hosting site. However, Apple has fixed this issue and claims that there is no violation in Apple’s “iCloud” or “Find My iPhone”. To prevent these types of attacks, Apple recommends using a strong password with two-step verification.

It is not confirmed whether Apple’s security flaw was the reason for the leak of celebrity photos. High-profile involvement and media interest have created a black mark on Apple. Especially with the official launch of the iPhone 6 and its first smartwatch soon, one wonders if this scandal was really a ploy.

Avoid data theft

Data in the cloud is often at higher risk of being stolen. In connection with the current situation, it would be advisable not to store extremely private information in the cloud, especially without ensuring proper protection of your account. Avoiding common passwords and establishing a two-step verification procedure is the way to go.

Cloud systems make managing your information simple and easy, but they also have drawbacks. It can be inconvenient to put in extra steps of care, but ultimately a little care goes a long way. It is evident from this incident that prevention is definitely better than cure.

Leave a Reply

Your email address will not be published. Required fields are marked *