apple

Apple responds to breaches of its security systems

The allegations of a breach of its security systems in the case of personal photo leakage celebrities from iCloud responded in a statement Apple .

apple

According to the American company, "after more than 40 hours of investigation, we found that some celebrities' accounts were violated by a highly targeted attack on usernames, passwords and security questions, a practice that has become very common on the Internet. None of the cases we investigated resulted from any breach on any of Apple's systems, including iCloud or Find my iPhone. We continue to work with law enforcement agencies to identify the villains involved. To protect against this type of attack, we advise all users to always use a strong password and apply two-step verification. "

Meanwhile, the "storm" continues with the leakage of celebrities' personal photos, centered around the American actor Jennifer Lawrence. The case is being investigated by the FBI, and the incident has raised concerns about the security of cloud storage services in general, but also how difficult it is to violate user account codes.

The photos appear to be leaked initially to 4Chan, by a user who identified himself as a "collector" rather than a hacker, and who announced the release of even more photos. The images in question have spread to the Internet through social networking and posting on websites and blogs, although they are very often deleted within a short time because of the extent of the case. Some celebrities have talked about fake photos, but some have confirmed their authenticity.

Source: naftemporiki.gr

 

iGuRu.gr The Best Technology Site in Greeceggns

Get the best viral stories straight into your inbox!















Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).