Jennifer Lawrence, Kate Upton… maybe you?
The FBI is investigating how a possible flaw in the iPhone operating system may have contributed to allowing hackers to access actress Jennifer Lawrence’s and model Kate Upton’s phones (in addition to others) to retrieve and then release nude private pictures they had taken and stored on their phones.
Some believe the glitch could be associated with the “Find My iPhone” app. In short, hackers could use a computer program to try various passwords to access the user’s iCloud account, as known as “banging”.
The iCloud stores more than photos. People use it to store business, financial and confidential information.
Apple has released a statement claiming that “None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud or Find my iPhone.”
However they happened, these leaks have affected many public figures and while it’s utterly embarrassing and degrading to have your personal photos leaked in the public eye, it would be foolish to think that the normal person isn’t at risk for the same treatment.
These common mistakes can make you more vulnerable to hackers.
Having the same passwords for different sites
Yes, it’s a pain to have a different password for your Gmail, Facebook, outlook, twitter, online banking, Groupon account, etc… The hackers recognize social patterns and norms and use them to their advantage. Hackers know that people use the same password for different log ins and if the hacker is able to infiltrates one system, you can bet that they will try that same password on everything.
Being too trusting
Oftentimes hackers will send targeted emails that may even come from people you know, or at first glance appear like the people you know. Once you open it, not even downloaded, it can install keylogging software in your computer, carefully compiling every password, correspondence or action you perform on your computer, essentially giving the hacker the keys to anything you had accessed.
Hotspots
If you are on a public hotspot, maybe doing some work at a popular coffee establishment, there’s a chance that whatever is on your tablet, laptop or smartphone (once it’s connected to the WiFi hotspot) it could be compromised. There are several easily obtainable applications on the market that allow a hacker to compromise ANY device on a public WiFi system.
Great, so now what?
Think about “cold-storage” of sensitive information, cold storage meaning that it cannot be accessed online, as in an external hard drive that’s locked away.
Use different passwords for sensitive things, like iCloud and banking. If you don’t care about social media, then you can keep those passwords the same throughout.
Forgo using public WiFi networks. Instead, you can turn your phone into your own private hotspot.
You may not be Jennifer Lawrence or Kate Upton, but we all must be committed to keeping our private data, private!