Jennifer Lawrence Leak Made Security Experts Warn OthersAdded: Sunday, September 7th, 2014
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
The warnings were made that there could be many more compromised iCloud accounts. This conclusion was made after examining file data from images stolen from Jennifer Lawrence and other stars.
One of the theories says that the pictures were collected by some hacker over a period of time and then were stolen from him by another hacker. Indeed, the earliest compromised pictures were dated December 2011, while the most recent was from August 2014. There was also reference to some Dropbox tutorial file in one of the hacked accounts, suggesting that the pictures originated from some cloud storage service.
But the recent posting to Github of an exploit against the well-known Find My iPhone app explained that a “brute-force” attack could be used to find out a password. This means that Apple’s service had some flaws which could have been exploited if the hackers had the victim’s email address.
It looks like the original hack has been done by “chaining” between different accounts: after gaining access to the first account, the hacker could access the address book and find new victims.
In the meantime, Apple hasn’t provided any comments on how many iCloud accounts had been hacked thus far. However, the company has come in for strong criticism over the lack of protection against “brute-force” attacks that could steal a password. The security experts believe that if iCloud account passwords could be brute forced, the problem is in the lack of rate limiting by Apple, not lack of crypto.
The other theories claim that the source of the pictures could be staff with the ability to access iCloud backups. In response, Apple explained in its support documents that all iCloud backups are encrypted. The company claimed that the customers’ data is protected from illegal access both during the transmission to the devices and when being stored in the cloud.
Thus far it is unclear how exactly hackers managed to break into iCloud accounts and steal sensitive data. Therefore, there is widespread confusion about the implications of the hack. Some security experts warn that it might be just the beginning. Given that the folders of images with thumbnails visible have been revealed, other celebrities can also suffer from the leak.
Posted by: Date:
Sunday, September 7th, 2014
|The oh so un-hackable has been hacked! Apple just like every other device and services can be exploited. To error is um tech?|
|Funny how this information isn’t all over the media ( yet ).. I wonder how much Apple have paid to keep 'em quiet... lets all see what the Market price on apple shares is come Monday : D|
|all or most systems r hackable.that's y they get hacked!!the so-calld NFO-Super HWY's so cluttered wit "traffic",wat u xpect?????????? 95% o us r like sheep surrouded by wolves.surprisingly this NFO-HWY hasn't collapsed.....|
|posted by (2014-09-08 01:31:27)|
|NFO - Super HWY's ? ?|
|First, who would put those kinds of files in their iCloud storage?|
"Someday when I'm bored I'll just download that old video of me sucking off my ex. For memories or whatever."
I understand that they come from their iPhones, but it's a common phone. If anything, these women that had their image/videos stolen are just technologically illiterate and had their passwords stolen from junk websites or any of numerous other places. Not a complicated thing since plenty of other sites with crap security have the same passwords from users as the secure places. Put 2 and 2 together and you can steal anything from them.
It's the same as stealing a card wallet at a grocery store. Get one PIN number, and you likely have ALL their PIN numbers.
|posted by (2014-09-08 13:59:09)|
A test to take down the internet during the next false-flag attack?
There is no way the perpetrators of a new 9-11 can allow the independent media to operate during a false-flag, lest we find and report the signs of fraud. Remember that in the weeks ahead of 9-11, the FBI was shutting down Muslim websites here in the US, to prevent the victims of the coming frame-up from defending themselves while the official story was implanted into the population.
And the fact that this shut down was confined by the planted malware to only New Zealand suggests it was an operational test.
|Haha! Ain't nothing like backing your personal data the|
old school ways. Ain't nothing safe anymore. Oh, Apple
computers are very hackable. Heard about the Apple's
iCam hack? Be very worrier!
|posted by (2014-09-09 01:29:43)|
|I`am glad to see that at least a few of you yanks know 9-11 was an inside job!! nice 1 tiggos.|
I`am a kiwi and yes New Zealand has been used as a Testing ground before and surely will be again.
|posted by (2014-09-09 08:43:22)|
|for years all these security threats to apple were well known but apple has nt figured out yet how to charge people for their patches so apple does as little as possible.|
you buy a apple product and get hacked it's your own fault for being a uninformed idiot.
|posted by (2014-09-12 18:58:21)|
|So where are these pics?||
Most Popular Stories