Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Apple Ramps Up iCloud Defense Against Hackers: Report

SAN FRANCISCO – Apple is ramping up iCloud defenses in the aftermath of hackers swiping nude photos of celebrities from the online digital vault, the Wall Street Journal reported late Thursday.

SAN FRANCISCO – Apple is ramping up iCloud defenses in the aftermath of hackers swiping nude photos of celebrities from the online digital vault, the Wall Street Journal reported late Thursday.

The Journal quoted Apple chief executive Tim Cook as saying iCloud accounts of film stars including Jennifer Lawrence were looted by hackers who used tactics such as correctly answering security questions to obtain passwords, or tricking victims into revealing user IDs and passwords with ruses referred to as “phishing” scams.

In coming weeks, Apple will start sending people alerts when attempts are made to change passwords, restore iCloud data to new devices, or when someone logs in for the first time from a new Apple gadget, the Journal reported.

Tools will be in place for legitimate users of accounts to seize back control. Cook was quoted as saying that Apple also wants to make people more savvy when it comes to guarding against hackers with strong passwords and other techniques.

“When I step back from this terrible scenario that happened and say what more could we have done, I think about the awareness piece,” Cook was quoted as saying. “I think we have a responsibility to ratchet that up. That’s not really an engineering thing.”

Apple will expand the use of “two-factor authentication,” which requires someone trying to access an account to augment a password with something else such as a temporary code sent by text message to the account holder’s mobile phone.

Apple said Tuesday a “targeted attack” led to the release of nude photos of celebrities including Oscar winner Lawrence but insisted there was no breach of its cloud storage system.

The admission came as experts and lawyers said the hack was a wake-up call about the dangers posed by technology to people’s privacy, whether they are stars or not.

Advertisement. Scroll to continue reading.

“After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet,” Apple said.

“None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud or Find my iPhone. We are continuing to work with law enforcement to help identify the criminals involved.”

The Federal Bureau of Investigation confirmed it was investigating.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.