Celebrity Photo Hack Highlights Cloud Computing Security Concerns

Celebrity Photo Hack Highlights Cloud Computing Security Concerns

One of the biggest technology stories over the Labor Day weekend was the apparent hack of Apple’s iCloud service that resulted in the release of nude photos of celebrities, including Jennifer Lawrence. The hackers appear to have taken advantage of a security vulnerability in Apple’s Find My iPhone; a proof-of-concept called iBrute shows how it could have been done. Apple says it has fixed the problem, and the company and the FBI are both investigating.

For enterprises, this incident again raises the security issues inherent in the use of mobile devices and public cloud computing services. Many smartphones, like the iPhone, automatically back up device data to a cloud service. When employees use personal phones for work purposes, they could be putting enterprise data at risk unless the company has taken appropriate measures to stop that from happening.

The use of public cloud services for other business purposes, including cloud development, could pose similar risks. Ars Technica writes, “If it?s in the cloud?a public, free cloud service, especially?then chances are good that eventually it will find its way to the Internet. Cloud services are leaky by their nature; things that are supposed to be private get stored alongside things that are shared, and anything from user error to a previously undiscovered vulnerability can make even strong passwords pointless, while exposing all of those things to the world.”

View article

Share the Post:
data observability

Data Observability Explained

Data is the lifeblood of any successful business, as it is the driving force behind critical decision-making, insight generation, and strategic development. However, due to its intricate nature, ensuring the

Heading photo, Metadata.

What is Metadata?

What is metadata? Well, It’s an odd concept to wrap your head around. Metadata is essentially the secondary layer of data that tracks details about the “regular” data. The regular

XDR solutions

The Benefits of Using XDR Solutions

Cybercriminals constantly adapt their strategies, developing newer, more powerful, and intelligent ways to attack your network. Since security professionals must innovate as well, more conventional endpoint detection solutions have evolved