Apple denies iCloud breach in celebrity photo Leaks

Apple denies iCloud breach in celebrity nude photo hack, celebrity photo Leaks, iCloud hack, Apple denies Apple icloud hack, celebrity nude photo Leaks,
Apple denies iCloud breach in celebrity nude photo hack,  celebrity photo Leaks, iCloud hack, Apple denies Apple icloud hack,  celebrity nude photo Leaks,
In the response of recent celebrities personal photos leaked, where it is been said that the leak was done by hacking Apple iCloud service. On this Apple team have made a security breached investigation and hence today Apple confirmed that Apple's iCloud service was not breached in celebrity photos leaked incident.

Additionally Apple says however, that certain celebrities were the subject of targeted hacking attempts that focused on compromising their usernames, passwords, and security questions. Along with the iCloud confirmation, Apple have also mentioned that Find My iPhone service was also not involved in the photo theft.
As some of the speculation has been made that, a Brute-Force script was published on GitHub that exploits the vulnerability on the Find My iPhone service API, which leads to make the number of guessing password over targeted account. Apple team had immediately patched the issue soon after they get about the issue.

On the statement Apple says that--
We wanted to provide an update to our investigation into the theft of photos of certain celebrities. When we learned of the theft, we were outraged and immediately mobilized Apple’s engineers to discover the source. Our customers’ privacy and security are of utmost importance to us. After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet. None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud or Find my iPhone. We are continuing to work with law enforcement to help identify the criminals involved.
To protect against this type of attack, we advise all users to always use a strong password and enable two-step verification. Both of these are addressed on our website at http://support.apple.com/kb/ht4232.
Read Also
Post a Comment