Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • Storage

    iCloud Photo Thefts Put Apple, Cloud Data Storage in Cross Hairs

    By
    Don Reisinger
    -
    September 3, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1iCloud Photo Thefts Put Apple, Cloud Data Storage in Cross Hairs

      1 - iCloud Photo Thefts Put Apple, Cloud Data Storage in Cross Hairs

      by Don Reisinger

      2It Started With iCloud

      2 - It Started With iCloud

      This hack came about because some household-name celebrities apparently uploaded private images and personal information from a variety of computing devices to Apple’s iCloud service. The hacker or perhaps a group of hackers launched targeted attacks against these celebrities’ personal accounts to gain access to whatever was stored in the iCloud accounts.

      3Security Analysts Blame the Lack of Two-Factor Authentication

      3 - Security Analysts Blame the Lack of Two-Factor Authentication

      Some security experts said iCloud customers are vulnerable to attack because of the lack of two-factor authentication on the accounts. With that feature in place, the hacker would have been forced not only to enter the correct password, but would also need to have a second form of identification to get access to user accounts. That didn’t happen with the celebrities’ accounts because they ostensibly did not take advantage of Apple’s two-factor authentication option. Hopefully, in the future, more people will use Apple’s two-factor authentication services, or Apple itself will start to require it.

      4Purloined Images Circulated Widely on the Web

      4 - Purloined Images Circulated Widely on the Web

      Not surprisingly, the images that were initially posted to 4Chan started widely circulating on the Web very quickly. The photos, some of which are reportedly real and others fake, were shared on Twitter, Facebook, Reddit and other sites. While many of the sites have removed the images, they’re still floating around the Web and likely will continue to do so indefinitely.

      5Apple Claims iCloud Itself Isn’t to Blame for the Data Leaks

      5 - Apple Claims iCloud Itself Isn't to Blame for the Data Leaks

      While security experts and pundits have been quick to blame Apple’s security flaws for the hack, the company claims that iCloud’s infrastructure isn’t at fault. In a statement late on Sept. 2, Apple said that the hack was “a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet.” Even so, the company could expect to face some backlash from security experts who contend Apple should have done more to prevent the data thefts.

      6Was iBrute the Culprit?

      6 - Was iBrute the Culprit?

      A tool called iBrute might have been used in the attack, according to some security experts. However, the tool, which carries out a so-called “brute-force” attack that uses an endless string of password guesses to break into users’ accounts and files, was marginalized by early September when the tool’s author said Apple closed the vulnerability that allowed it to work. It’s likely, though, that the attacks were going on for a long period and iBrute could have been used before it was neutralized.

      7Security Experts Say to Limit Password Guesses

      7 - Security Experts Say to Limit Password Guesses

      One of the big issues with Apple’s iCloud is that it allows for an unlimited number of password guesses. So, an automated tool like iBrute could be used to carry out an attack that inputs countless guesses until the password is finally cracked. It hasn’t been confirmed that this was the tactic used, but considering Apple’s password system doesn’t time-out after multiple password entries, it gave the hacker an unlimited number of chances to break the password security.

      8This Isn’t Just Apple’s Problem

      8 - This Isn't Just Apple's Problem

      Let’s not forget that Apple is not the only cloud storage service that’s at risk these days. While its iCloud was the apparent target this time, countless companies have had to deal with network and database attacks that resulted in data breaches. Some of these breaches have resulted in the leak of celebrities’ private images. Apple just happens to be the latest victim in a long line of attacks.

      9Apple Says It Will Fix the Problem

      9 - Apple Says It Will Fix the Problem

      To its credit, Apple said it is moving swiftly to address the security issue. The company has said that it has looked into how this happened and will take every measure to ensure it doesn’t happen again. The big question on everyone’s mind, however, is whether Apple actually has the ability to stop hackers from accessing iCloud. Like every other company out there, Apple is discovering that safeguarding customer data is a serious challenge.

      10Analysts Say This Won’t Hurt iPhone Sales

      10 - Analysts Say This Won't Hurt iPhone Sales

      Apple is planning to hold a product introduction on Sept. 9 when it is expected to unveil the iPhone 6. Some pundits suggested that the hacks would negatively affect iPhone sales, as customers would see iCloud as a security risk and decide against buying the company’s device. However, several Apple analysts chimed in on the issue, saying that it won’t hurt iPhone sales whatsoever, and Apple will have yet another banner year for smartphone sales.

      11This Didn’t Just Happen Overnight

      11 - This Didn't Just Happen Overnight

      When, exactly, did the hack occur? Although the pieces are being put together, it’s believed that the hacker was able to access the accounts over a period of time. The attacker may have been stealing the images from targeted accounts for at least several weeks. Only after all that data was stolen did the hacker actually move to release the images and threaten to share even more.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×