Monday, September 22, 2014

#GeekyGossip: She Leakin', How Safe is iCloud?

After yet another leak of female celebrity nude photos and total invasion of privacy, its starting to leave many wondering how and why this is happening. Well no need to panic. Yes, celebs had their iCloud accounts hacked but no, you won't need to shut yours off, and here's why:

Mashable gives us the lowdown from Apple:

Hacking into cell phones or online accounts to access nude or personal photographs from celebrities is hardly new (remember when Paris Hilton's SideKick was hacked?), but what makes this incident potentially more disturbing are the rumors that this cache of images is associated with a broader attack on iCloud and its Photo Stream feature.

To be clear, it is not confirmed that iCloud was involved in this incident. We've reached out to Apple for comment and will update if we get any statement from the company. It's also important to note that even if iCloud accounts were compromised, that doesn't necessarily signify a larger, systemic breach.
Still, knowing how many people use iCloud, we wanted to address how safe iCloud and other cloud systems, such as Dropbox, Google Drive and OneDrive, are.


Until we see any evidence that indicates that a broader iCloud breach occurred (or even get confirmation that iCloud was involved in these incidents), we have no reason to believe that iCloud is unsafe.
The much more important question that users should ask themselves — whether they use iCloud or Google or OneDrive or Dropbox — is if they can trust themselves.
This means:
  • Using secure, unique passwords on their accounts and device
  • Using two-factor authentication when available (Two-factor authentication means that before you can access an account, you must login with both a password and a unique device cod.)
  • Enabling locks and passwords on computers and phone accounts
  • Running the latest version of an operating system
Those steps alone won't ensure that your data will always be safe — but it will go a long way in minimizing how attackers can access your accounts.

No comments:

Post a Comment