November 23, 2024

4 Security Training – iCloud Account Hack

Posted on August 21, 2012 by in Blog

 

Earlier this week, author Pad Honan had the unthinkable happen. Someone experienced his iCloud account, plus they could remotely wipe his apple iphone, iPad and Mac laptop Air and remove his Google account which was mounted on his iCloud account. The first assumption was this happened since the hacker brute-forced his distance to Honan’s account. After a little further digging, it found light the hacker was simply able to utilize social engineering to trick Apple Support into resetting his password.

Around we love to to trumpet using good passwords, this really is one instance by which this will not have designed a difference. You should use the very best password on the planet, but when someone can socially engineer you or someone in the site or service itself to show passwords, it’ll make no difference. That is not to state that strong passwords aren’t important getting a powerful password will safeguard you from nearly all common attacks. However, you should certainly not wager the farm on the password.

You will find numerous questions this raises, obviously:

  • What else could you do in order to get over a catastrophic loss of data incident?
  • What else could you do in order to safeguard yourself from this kind of attack?
  • What’s the probability of this happening in my experience?

Honan learned the response to this primary question hard way: Make regular backup copies in multiple locations. Don’t simply depend around the Cloud to keep your backups–websites aren’t bulletproof, companies go bankrupt, problems happen. Honan may recover the accounts which were jeopardized throughout this hack, but that’s by no means certain in each and every situation. He might not have the ability to recover the year’s price of data he hadn’t supported in another location. (Though he was fortunate the remote wipe didn’t complete, so it might not be lost.)

For that second question, we’ll define the attack like a compromise on any internet account that consists of a great deal of your important data whether that become your contacts, your calendar, entire backup copies, or selected files, or simply links to numerous your other accounts (social media, banking, shopping online, etc). This may be iCloud, this may be Google, it may be a variety of different services.

We must think that you cannot trust the security of the password alone, as that may be stolen by social engineering or hacking of one other sort. But this really is another place in which a layered defense strategy is available in handy. We already covered the necessity to support your computer data in multiple places. But what else are you able to do?

  1. Secure because the internet data as possible.