Tuesday, September 9, 2014

Taking The Extra Step to Protect Your Online Privacy


Perhaps you may have already heard the latest news, but hackers have recently attacked Hollywood's most beloved Celebs!  Top celebs including Jennifer Lawrence (Hunger Games Series) and Kate Upton (Model) were two of the many celeb victims whose most private of photos were compromised to the world via hackers. What!? How could this happen you ask? Well... What is estimated to have happened to these unlucky celebs is that the unknown hacker or hackers successfully discovered the celebrities iCloud accounts, a cloud or internet/network storage system provided by Apple inc., and hacked into them with the intent of obtaining nude celeb photos.  These photos were then shared anonymously and dispersed throughout the web for all to see Huffington Post.  It is assumed by tech experts that the app "Find my iPhone" was the key tool used by the hackers. Although it is still unknown how exactly these photos were hacked, it ultimately raised awareness of the overall security of iCloud and thus new security measures have been taken to by Apple Inc. to protect its iCloud users.


So What?...
If this can happen to celebrities it can happen to anyone! This news story brings up the bigger question of how aware are you of your online privacy? As technology is fast expanding in our lives it is important to recognize the importance of taking the extra step to protect your privacy. Simple practices as reading fine print, assessing your privacy settings, having passwords with multiple characters and numbers can protect you against possible cyber crimes such as this.

Click Here For Tips on How to Secure Your iCloud


3 comments:

  1. Additionally, one should think twice before posting, sharing, or storing *any* content online that would be truly embarrassing or shameful if it were to become public...

    ReplyDelete
  2. I suppose regular folks should be less concerned about such an attack than celebrities but it is still concerning. Literally, everything one posts, shares, or messages can be accessed. We know governments are intercepting this data which leads to another concern about whether a government can use this information to black mail or attack political opponents. Unfortunately, crimes like these seem as though they will become more common place.

    ReplyDelete
  3. Also, did you read Hannah's post on the 121 in Wonderland blog about this same topic?

    ReplyDelete