![]() The photos which get saved in the My Photo Stream of iPhones get backed-up in the iCloud. The iCloud service works only on a password and login ID (which is the email). The code exploits the weak link in Apple’s Find My iPhone features which allowed hackers multiple unlimited attempts at passwords. On 30 August, a day before the mass leak, a code for an AppleID password brute-force proof-o-concept was shared on the code-hosting site GitHub. Here’s a look at how accounts can be hacked: But for them, celebrity pictures made a better choice to encash. Not only photos, hackers would have had access to a lot of other personal data like phonebook details, calendar entries, texts, real-time GPS coordinates and any notes stored on the phone. But others like Victoria Justice and Ariana Grande have issued statements calling the photos fake.Įxperts say that hackers were able to get access to the media stored on the cloud either by using Apple’s ‘Find my iPhone’ feature or hacking into the desktops and laptops. Some of the celebrities like Jennifer Lawrence and model Kate Upton have acknowledged that the leaked photos are real.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |