Menu
Bayou Technologies | Lake Charles, Louisiana | Technology | Cybersecurity | Communication | Marketing
Computer IT Services & Marketing
  • Technology
    • Managed Services
    • Computer Repair
    • Consulting
  • Cybersecurity
    • BDR
    • Network Security
    • Computer Security
    • Data Recovery
  • Communication
    • Cabling
    • Wireless Networking
    • Phones
  • Marketing
    • Website Development
    • Search Engine Optimization
    • Social Media & Online Presence
    • Location Scan
    • Website & Email Management
    • Online Advertising
    • Multimedia Design
    • Newsletter
  • CALL: 337-214-1172

HOME  |  BLOG  |  REMOTE SUPPORT

Home
Support
Blog
Contact
Close Menu
#PrivacyIsDead
September 6 2014

#PrivacyIsDead

wukovits Internet, Security, Smartphones, Social Networks #PrivacyIsDead, Apple, brute-force attack, celebrity hack, Find My iPhone, hack, iCloud, privacy

#PrivacyIsDeadLast week, the Internet hype factory exploded with the news that a number of female celebrities had been hacked; with the contents (most notably photographs) being pilfered from their iCloud backups. Of course, the photos that are getting the attention of everyone are NSFW (Not Safe For Work) and the FBI is even getting involved. Fingers are being pointed at Apple for lax security practices on iCloud accounts. Apple is pointing fingers at peoples’ lax personal security policies, like simple passwords and security questions whose answers that can be easily researched online. The blame game can be played, but at the end of the day, we all have a part in this blame.

Let’s talk about iCloud for a moment: Apple’s part of the blame is a vulnerability in the “Find My iPhone” service where failed login attempts weren’t blocked after a certain number of incorrect answers. The hackers used a brute-force attack, which consists of attempting different characters in passwords until the correct one is found. Had the Find My iPhone service been using protection against brute-force attacks, this breach of private data could not have been accomplished. Apple quickly reacted after the attack and patched this, but I reckon this incident has bruised their ego (and stock price) right before the new iPhone launch event.

While Apple does hold some of the blame, user passwords and security questions are definitely a subject for discussion. While I don’t know how secure these people tried to be, I do know that many peoples’ passwords can be darn simple. Security questions like your birthday, what high school you attended, or your father’s middle name, can be easily identified thanks to the wonder of social media and Google. We provide a lot of information to the world, both knowingly and unknowingly, and this data can be mined relatively easily. Using secure complex passwords, having custom security questions, and implementing two-factor authentication whenever possible are paramount in doing as much as you can to prevent this type of hack.

Now that we’ve addressed the lax security policies, let’s zoom out and take a look at what really is the issue: personal privacy. One huge issue here is the violation of these peoples’ privacy by these hackers. This is definitely something that deserves attention and potential prosecution for those guilty parties. But the only reason this hack is seeing this amount of attention is because the victims of the hack are famous. It stands to reason that anyone could have been compromised like this. Amateur hackers can easily attain incriminating photos, videos, texts, and more. Imagine what types of hacks are possible by professional hackers? It is safe to assume that our government is able to get anything they need should the need arise.

In our modern technological society, our expectation of privacy is nearly gone. We have become tethered to the Internet in such a way that we are doing all the heavy lifting. We are documenting our own lives, simultaneously giving others the means to monitor us. If you don’t want someone to see you, don’t take a picture. If you don’t think someone can’t see it, you’re wrong. Don’t be surprised when your secrets are revealed if it is you that has been whispering them.

The Challenge Invest Your Pennies With Acorns

Related Posts

Hacker Attacks On Healthcare Industry Are On The Rise

Blog, General Interest, Recent News, Security, Technology News

Hacker Attacks On Healthcare Industry Are On The Rise

Adobe Flash Has Reached End of Life Status

Blog, General Interest, Recent News, Security, Technology News

Adobe Flash Has Reached End of Life Status

Weak Passwords Are Making Easy Work For This New Malware

Blog, General Interest, Malware and Virus Protection, Recent News, Security, Technology News

Weak Passwords Are Making Easy Work For This New Malware

Recent Posts

  • Big Changes Coming To Microsoft Outlook In Coming Years
  • Hacker Attacks On Healthcare Industry Are On The Rise
  • Adobe Flash Has Reached End of Life Status

Archives

Categories

Get a Domain Registered


$.99* .COM Domain! Get going with GoDaddy!

Back To Top
Bayou Technologies | Lake Charles, Louisiana | Technology | Cybersecurity | Communication | Marketing
  • Home
  • Technology
  • Cybersecurity
  • Communication
  • Marketing
  • Newsletter
  • Blog
  • Support
  • Contact

BBB Logo

Bayou Technologies, LLC
✖
Bayou Technologies is a BBB Accredited Busines
A+
On a scale of A+ to F

Reviewed, Evaluated and Accredited

Meets All 26 Standards of Accreditation

BBB Accredited since 1/1/2012

Click here for BBB Business Report on Bayou Technologies, LLC

BBB Accredited:

BBB Rating as of:

Verify Bayou Technologies, LLC
Bayou Technologies, LLC © 2019
Website Development and Marketing in Lake Charles, Louisiana
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.