Celebrity Photo Hacks: What we know so far and how to stay safe

7:01 PM
Celebrity Photo Hacks: What we know so far and how to stay safe -

Celebrity observers see more of their favorite starlets than ever after their accounts private Internet was recently hacked. This case provides a timely reminder of the importance of online security.

Although details are still sketchy, facts and quite poignant implications have emerged as well as some valuable takeaways. Read on to find out how these celebrities were exposed, and how to ensure that this does not happen to you

A iCloud Considered Tragedy:.? What happened with the Stars

If you 've been following the entertainment headlines, you would know that the private photographs of about 100 female celebrities -Including Jennifer Lawrence, Kate Upton, Ariana Grande, Kirsten Dunst - were published online

Many of them were nude photos. Victims stars themselves. The images were hacked from their iCloud accounts (although Apple denies that iCloud was raped), probably via their iPhones, and published anonymously on the scoreboard based notorious image 4Chan, before going viral.

iCloud accounts enable Mac users, iPhone and iPad to synchronize their images, calendar information and account settings from their Apple devices. It is not known how long the pirates had spent building their collection, or deleted images continue to be available in the cloud storage, like "Scott Pilgrim vs. The World " stars Mary Elizabeth Winstead insisted his pictures were removed from her account there for years.

a spokesperson Jennifer Lawrence, one of the most high-profile victims, called the security breach "a flagrant violation of privacy."

Apple is working with law enforcement officials to unearth the pirates involved. A long prison sentence probably awaits the guilty. In 2012, a man received a prison sentence of 10 years after hacking a range of celebrity email accounts, including those held by Scarlett Johansson and Mila Kunis. Anyone who publishes the stolen photos also will face legal consequences, according to Laurent lawyer. We do not know what these may be, although Twitter has suspended the accounts of a number of offenders.

how they may have been exposed and Key Takeaways

Early speculation suggested that hacks may have been following the Apple system violations. The technology company has denied in an official statement and instead blamed standard phishing techniques. He explained that the breach came from "a very targeted attack on user names, passwords, and security questions." Media as revealing details about the lives of celebrities, it is easy to see how hackers can get the information they need to stage such a large-scale attack.

So, we know what happened, but how can you ensure that this does not happen to you? Here are three valuable things you can do to stay safe:

Be careful what you share
Jennifer Lawrence has committed a cardinal sin when she told Time Magazine that his email contained a keyword. Although this was a small hint, it seems to be enough for hackers to target. Of course, you do not have a public forum such as Lawrence, but no details reveal your online identity on Facebook or other social networks could also be exploited. For example, a hacker with your email address can send you an email phishing posing as iTunes to extract your password. Keep your private information to avoid being targeted.

There are not your e-mail address you need to keep hidden, however. The "forgot my password" system used by Apple and many other providers will give access to anyone who knows your birthday and some other important facts.

For celebrities, many of these data are readily available. You have a much better chance of keeping these hidden data, but only if you are selective with what you reveal about social media and other outlets. Things you post about - your children, your pets, and your favorite teams - should not be the basis for your passwords or security questions. Opt for more obscure details that are known only by you.

Be Smart Password
In its official statement after the attacks of celebrities, Apple said that using a strong password and allowing two audit step two are the best defenses against a security breach like this. As we have covered in previous posts on this blog, strong passwords contain at least 10 characters. These characters must be a mixture of uppercase and lowercase letters, numbers, symbols, and other characters.

The two-step verification uses a separate channel, as an SMS to a mobile phone to send a verification code each time an account from a service like Google Drive, Dropbox, iCloud or Evernote (among many others) is accessible from a new device or location.

It might be easier for you to remember one password, but it also means that if someone hacks a single account, they can access your email, your iCloud, your PayPal account and more. Vary your dramatically passwords to maintain a range of protected accounts; if you use the same password for multiple accounts, remember that the password is as strong as the security measures and the level of encryption on your weakest account. It is far too easy for hackers to work on small password changes like having a different number at the end of a word.

Adopt secure Internet Habits
If the pictures were synchronized iCloud on a public WiFi network, hackers would have snooped on WiFi and accessed the pictures this way. Personal VPN (virtual private networks) as Hotspot Shield can provide an extra layer of protection (especially when connecting to unsecured networks) by encrypting all your Internet communications, so it is best to use a VPN at any time to keep sensitive data safe.

It is also smart to regularly review the permissions on your smartphone and tablet applications. Many celebrities affected by the latest cyber attacks may have been aware that their mobile devices were upload images to the Internet. Stop the automatic data transfer is a great way to strengthen your security and put the power to share or not to share back in your hands.

It is also a good idea to periodically move photos from your mobile external hard drive. This can be encrypted to keep your security image files, even if the drive is lost. Once they are moved, make sure that the photos are really removed and not just held in a basket for easy retrieval.

It is difficult to Hack What Does not Exist Online

Although these measures will make for safer online accounts, they can not protect a user against the most sophisticated hackers. While we all have the right to expect a level of privacy online, it is difficult to guarantee. If you are all concerned about your information or intimate pictures being leaked, so maybe they are better kept offline.

Although this series of events is something of a tragedy for the celebrities involved, it also contains teachable moments for the rest of us. You might not have the high profile celebrity victims, but you might be just as vulnerable if you do not get smart safe online. Develop better habits, and you might avoid the embarrassment and shame that these unfortunate starlets currently face.

Previous
Next Post »
0 Komentar