Wednesday, September 3, 2014

To what extent are your photos safe in the cloud? – La Voz de Galicia

The wave of leaking intimate pictures and videos Celebrity on the Internet has become talk of the public the security storage services Data in the cloud , an issue that, from the beginning, consumers have always looked askance.

The images of actresses like Jeniffer Lawrence , Rihanna, Kirsten Dunst, Scarlett Johansson Selena Gomez or spread like wildfire on Sunday on social networks. The first-the most impact has had-has threatened to sue any media to publish their “stolen pictures”. But, Who is to blame? Are the media responsible for the dissemination of this private stuff? Is it only a breach in security storage service ? How much blame do users store their photos in the cloud?

You guessed passwords

The first point to scores possible security hole , to be confirmed in the system iCloud Apple . This service allows users to store data in the virtual world, without taking up space in real memory electronics. The apple company is investigating what happened, but, initially, ruled that the failure to localize at the vulnerability of their systems . “None of the cases we investigated occurred as a result of unauthorized access to our systems, including iCloud and Find my iPhone” technological factory said Tuesday. The attack by the use of ‘user names, passwords, and security questions “of those affected, Apple maintains,” a practice that has become very common on the Internet. ” Such incidents, added, occur by protect bad accounts use passwords weak and easy to crack and not activate the method of two-step verification.

The images took up positions on a message forum 4chan, hung by a person (or group) anonymous. claimed that they were obtained from iCloud accounts Lawrence and other celebrities like Kate Upton and Mary Elizabeth Winstead. Security experts shuffled several possible scenarios. One option suggests that hackers got the email from victims and achieve deceive the iCloud service to request a new password guessing the security question. Another, as told EFE Jesus Molina, an independent security consultant, argues that pirates found a vulnerability that allowed access to the account , for example, through the Find my iPhone app ( Find My Phone), which allows tracking and remote lock a lost or stolen phone. Most services online have a number of attempts to enter the password but as two Russian engineers recently discovered group of computer Defcon DCG Group # 7812, this was not the case of this application, something that has already been repaired.

“Many people have things in the cloud without knowing it”

Molina believes that “it is no exaggeration” unleashed distrust among some users after this incident because, in fact, “we know where our data go.” Furthermore, “many people have things cloud unknowingly” , as there smart phones where certain services, such as location, are enabled by default, and believes companies’ play our laziness and ignorance. ” “We can hardly go to the setting, see if it is activated, if it is not activated …” Molina, who believes that this incident “will help people to see what you have,” explains.

As for explanations of Apple, the expert agrees that ‘very unsafe’ passwords are used, but acknowledges that “it is very difficult for a person to walk away saying, I will use a password I’ve never used before and will use a very complicated ‘. Considers that as users’ have to get involved more » and read all conditions that companies have when we get off an application. For the companies, “there should be a way to know what your phone is sending data, a simple and easy way; what we are sending what source. “

As for the author or authors of computer attack, Molina believes he did someone looking for fame, because” if you had sold these photos to publications would have earned more money. ” “It’s probably a guy or group of guys who had little idea of ​​what they were doing, they got it and then did not think much,” he added.

More Selection made automatically

LikeTweet

No comments:

Post a Comment