Monday, September 1, 2014

Weak passwords and vulnerability iCloud: experts suggested how hackers could get access to the intimate photos of celebrities

On the night of Sunday to Monday, hackers broke into the accounts of celebrities to iCloud and posted their intimate photos on the Internet. In the public domain were pictures of Hollywood stars, including actress Kirsten Dunst, Rihanna, the star of 'The Hunger Games' Jennifer Lawrence, and others. Experts from the Parallels suggested manner in which the accounts have been hacked in iCloud and told how users can protect their data.
icloud-photo-hack-1

In addition to the photos of Lawrence and Rihanna during the hacker attack were kidnapped and private photos Mary Kate Olsen, Ariana Grande, Victoria Justice, Kate Upton and other celebrities. Multiple images of stars appeared not in the usual form for the audience - without make-up, and sometimes half-naked. Just a list of more than 100 victims celebrity names.
Currently, police are trying to identify the computer that worked as a hacker. Two years ago, they were able to establish the identity of the person who posted on the Internet private photos of Scarlett Johansson and Mila Kunis. Burglar got 10 years in prison.
icloud-photo-hack-2
Anton Grandfathers, security architect of of Parallels, in an interview with The Village told how to safely store data in the cloud, and as the Apple iPhone and iPad users can protect personal information.
"Depending on the type of cloud (corporate, public) and different security model.Clouds are not very easy to do safe. As users of public services - iCloud, Facebook, Instagram and others - use the service through multiple entry points (mobile, PC or laptop, the web site), the components and ensure the safety of the public cloud complex.
Hackers are constantly looking for weaknesses of these components. If iCloud possible vectors for such attacks: weak protection accounts (weak passwords and the lack of two-factor authentication), unauthorized access to user devices and computers (the user does not track who uses his service) and possible vulnerabilities in the platform itself (we have not analyzed the iCloud , so it's hard to say what could happen).
The weakest link is always the people. In 2012, a reporter for Wired was the victim of a successful attack. Attackers won access to his phone, deceiving support Apple and Amazon: they called and introduced the account holder, right called code words and passwords. "
According to Grandfather, hackers interested in fame and money, and crackers iCloud - also the desire pobravirovat. Many users of the compromised service, the more interesting, and iCloud is the most popular cloud service in the United States. It is possible that a person who gains access to the photos of stars, can capitalize on this by selling the pictures, the expert said.
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF