247 Detectives

Please Call NOW 0845 520 4121 / 07017 411 007

Please Call NOW 0845 520 4121 / 07017 411 007

Content Area 1

1st Call Detectives Blog

Get the latest information & news from the industry...

Archive +

Tags

Archive by Date

Lessons CAN be learned for the Celebgate hacking scandal

by Josef Kafka

On Sunday, August 31 2014, several celebrities had their privacy breached when their personal and sexually explicit photographs were stolen from their supposedly secure cloud-storage accounts and splashed over the web. This naturally caused outrage and sparked a great deal of fear among many people, as it was initially suggested that the pictures were stolen by means of exploiting weaknesses in the storage account’s system.

However, it has subsequently come to light that there was no weakness in the system itself, but these accounts were hacked by exploiting the users’ accounts themselves. So we can at least take comfort in knowing that the systems so many of us rely on are not as vulnerable as we first thought. We can only hope that the perpetrators will be traced and justice will be served.

Yet in an age when we are progressively putting ever more faith into cloud storage and trusting third parties to keep our data safe, should we be concerned that hacking attacks such as the “celebgate” scandal will become more commonplace and eventually be a widespread issue?

There have been many high-profile hacking scandals in the press over the last few years, Edward Snowden, the Leveson Enquiry, and so forth, and thankfully the authorities have undertaken thorough investigations and surveillance operations to locate the perpetrators and bring them to justice. But is it ever really possible to crackdown and prevent hacking?

It seems that the more sophisticated the security becomes to protect against hacking, the more sophisticated and devious the hackers become. Sunday’s incident has been blamed on a lack of diligence paid by the victims resulting in exploiting their secure credentials. However, given the fact that we’re all regularly inundated with emails and digital communications, it can be easy to miss a malicious email that was designed to access your personal data.

To keep ourselves safe, we need to be increasingly more aware of our own actions and pay more attention to our digital activities. We must think carefully about where we store our data and take any precautions necessary to keep our personal details secure.

http://www.theverge.com/2014/9/2/6098107/apple-denies-icloud-breach-celebrity-nude-photo-hack

Leave a comment
Areas & Postcodes We Cover
  • NW7, NW9, NW4, NW11, NW2, NW10, NW6, NW3, NW8, NW5, NW1, N20, N12, N3, N2, N10, N6, N8, N19, N7, N1, N5, N4, N16, N15, N17, N18, N11, N14, N21, N9, N13, N22 
  • E4, E17, E18, E5, E10, E11, E8, E9, E2, E1, E14, E3, E16, E6, E13, E15, E7, E12, SW6, SW10, SW5, SW7, SW3, SW1, SW14, SW13, SW15, SW20, SW19, SW18, SW17, SW16, SW12, SW2, SW9, SW8, SW11, SW4
  • EC4, EC1, EC2, EC3, SE1, SE11, SE17, SE16, SE5, SE15, SE14, SE8, SE24, SE22, SE4, SE21, SE23, SE26, SE20, SE25, SE19, SE6, SE12, SE9, SE18, SE2, SE28, SE7, SE10, SE3, SE13 
  • W1P W1M W1N W1R W1S W1T W1U W1V W1W W1X W1Y W1K W1J W1H W1A W1B W1C W1D W1F W1G W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
     
  • © All rights reserved 2014 '1st Call Detectives'
  • /
  • Website designed & devloped by evokeu