Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
This terrible story is the reason why nobody should put all their eggs in one basket (read: ecosystem). Be it Apple/Google/Microsoft. You're just asking for trouble.

Also 1 Password/Lastpass/Keypass are amazing. Use them.

I think its important to note that this guy wasn't hacked via brute force but social engineering. That means the "ecosystem" approach really didn't hurt him, it was shoddy support practices at Apple that did him the most harm here.

And as for various password vaults....those basically are useless to you if the PC and/or service you use to store them is compromised. For the average person, you are far more likely to have your computing device stolen than you are to be the target of a hacker.

Just from a backup standpoint, I always try to adhere to the 3-2-1 method...

Also works for smoked ribs....

3 hours @ 225F w/smoke
2 hours covered @ 225 w/out smoke plus apple juice
1 hour uncovered @ 225 w/sauce

Delicious!
 
Call back verification has its flaws. A lot of these types of calls are from other members of the family trying to make changes to the account. They don't always know all the information like security questions or the personal information of the holder, but they have access to the primary phone number used in the account and thus can pass call back verification easily.

It's not superior security, it's added security that at least you're talking to someone that lives in the same house as the account holder. Though security questions and personally identifiable information remains superior, if the individual is careful not to reveal these identification details to others.

I'm not saying that a call back should replace a security question. It improves security.
 
I'm amazed social engineering still works these days.

I'm also amazed Apple confirmed that's how it happened. Well that Apple representative is out of a job.

I use so many passwords that I often forget them frequently. Which is in a way a nice security feature as I have to reset them a few times a year.
 
Lets see if the gov gets every agency in the US investigating this like they do when a celeb gets some naked pictures hacked from their phone. :rolleyes:
 
I wonder how much private information did the "hacker" need to access the account. After all, this sounds more like identity theft than anything. Also, if you don't claim that your phone is stolen, the support staff could just hang up and call you (on your iPhone).
 
Apple wouldn't be able as they don't keep backups, that is the users responsibility. And before any one suggests it, no they will not pay for data recovery if you didn't. Terms and conditions, even under Apple Care, they warranty their hardware and thats it. Even with iCloud they don't 100% guarantee your data won't ever be lost.

As for Honan, I wouldn't be so quick to blame Apple. We don't know what steps are taken in such matters to know if the questions asked were ones he'd given out the answers to. This could be another case like my older brother who got his email hacked because he posted his birthday on his Facebook and his security question was 'my greatest love' which was the car he restored by hand and talked about on his Facebook, with photos by the dozens. Matt made ultimately be a victim of something similar. In which case Apple can't really be blamed

I am sure that Apple has a back up of the information people store in icloud.

foolish not to..
 
Leaving aside the fact that I am not sure what sort of restaurant you would be in where it would be considered appropriate to be checking bank details on your MacBook, I do not know of any bank that allows any transactions to take place without a confirmation of some security information, even once you're in. For bank transfers to a new account, my bank (in the UK) phones me to confirm the new account details. If I want them to phone a different number from the one registered with them, I have to wait a week (I know this because I was recently in the US for an extended period and needed to add my newly acquired mobile number to the account: it was 8 days before they let me use it). And for banks in the UK, my bank (LloydsTSB) is considered fairly lax in security: it has not yet adopted the hardware dongle approach most others have. As far as I'm concerned, your scenario simply couldn't happen. In any case, if it did, so long as you can demonstrate that the police were informed as soon as possible, and the bank shortly after, you're not liable for any losses incurred by the bank.

Apple shouldn't be giving out your information to non-account holders, and frankly, I'm very doubtful that they did. I'm afraid I don't think we have the full and frank version of what happened yet.

I believe the person can only empty out your account by wiring money to another account in your name, or a existing linked account. if it's a different account they send a written mail to your address and it takes a week(which yes could be intercepted and faked, etc) but at least it makes it that much more difficult.
 
I'm not saying that a call back should replace a security question. It improves security.

Well, again, yes and no. Security questions are inherently more secure as long as the individual keeps the information private. Like wise, call back is more secure if the information is compromised but not the primary call back number. Of course, the primary call back number can more easily be compromised by people who have access to the household.

Each has its flaws, its own advantages and its own weaknesses though I'd say it's much easier for an individual to keep his information private than make sure his callback number is not accessible to others (cell phones are worse than home numbers, since a cellphone can be stolen, a SIM card cloned, etc...).

Using a combination of both does improve security (after asking the questions, proceed to callback), though it is quite less convenient (the balance between security and convenience is important too) in that each time you need to modify your account, you must be close to your primary call back number.

Same for e-mail confirmation, it assumes that the primary e-mail account is unshared and not compromised (either through auto-configured password on a stolen cellphone/PDA or through simply the hacker knowing the password/having access to the e-mail through other means). It also requires that you have access to it at the moment you call.

We don't even need to talk about snail mail now do we ? ;)

That's why I refuse to say any type of call back/e-mail/snail mail is "superior" to personal identifiable information. I don't really think it is. Combining authentication methods is inherently more secure though, I'll grant you that, though it comes at the cost of convenience to the account holder.

In the end, iCloud is a consumer service for pictures, music and a few tidbits. The security and authentication procedures are made convenient enough for this type of service while ensuring the security is "good enough" for this type of data. You can't expect bank/government level hassle in recovering a lost password and thus the security that comes with it.

----------

I'm amazed social engineering still works these days.

How is it surprising ? Social engineering will always work. There is simply no protection against it. Fast talkers are fast talkers. They will get the info they need and use it appropriately when needed. You can't firewall, ID Card, biometrics around it.

I'm also amazed Apple confirmed that's how it happened. Well that Apple representative is out of a job.

Apple has not confirmed anything, Matt hasn't even claimed so. They have only told him that someone called in for a password reset. He claims they used "clever social engineering" which could be simply asking the rep to use another authorised authentication method than security questions.

There is no information provide that lets us believe the Apple rep did not do his job properly. Why do people keep ignoring this ?

I use so many passwords that I often forget them frequently. Which is in a way a nice security feature as I have to reset them a few times a year.

Relying on other people having access to reset your passwords is how these situations are created in the first place. If no one forgot their passwords, tech support people wouldn't need access to reset them in the first place.
 
Well, if you have everything on your iPad and on your iPhone and on your Macbook Air than making separate back-ups seems not necessary. You've three devices, three times the same files.

Offline backups are still necessary however. I have iCloud backups and once a month I do an offline backup of my iDevices to my external drive. I also do incremental weekly backups on Time Machine of my MBP.

As an editor for one of the most popular tech blogs, Honan was a fool for not doing a proper backup of his information. However, I do think Apple should foot the bill for any loss incurred on his part (the MBA did have work-related information as well as personal I believe) but.. as a Gawker employee, I sincerely doubt much will come of it.
 
Yes, I think you are correct, the last time i called Apple Care, first thing they asked me was the serial number, I wonder how did the "hackers" got the serial number?

That is in fact correct, without that information is confirmed, no applecare advisor will provide support regarding reset apple id or iCloud.

There are a kind of persons that are tech-savy and install all apps and jailbreak devices to test everything.

I'm not say that this is wrong, but sometimes apps can steal your details and send it to the hacker's server without you notice. In the end some apps run a key logger on the background. Like that anyone can pass by another person without any issue.
 
Inside job from within Gizmodo? They'll do anything for a few more ad clicks.

Wow. Some of you extreme fanboys seriously have some sort of chip on your shoulder. Give it up. Seriously.

This looks bad for Apple. This looks bad for the journalist/blogger. This looks bad for the state of cloud computing. This looks bad for everyone.

Seriously, get off your freakin' high horse and take a hard look at the issues at hand.

Some of you extreme fanboys seriously amaze me sometimes.

w00master
 
Don't use IE, and set the UAC down to the lowest (not off) level. You'll get one warning when you run an .exe file that intends on elevating to administrator.

----------

I don't use IE, it's the file security warnings.
 
So I sit in a restaurant with my wife, using my MacBook to check my bank account. A thief whacks me over the head and runs away with the MacBook. I'm unconscious, the thief is going to empty my bank account. My wife calls Apple. She doesn't have my password, or the answer to my security questions. What is Apple supposed to do?

And as I said, for encrypted hard drives it would be quite possible to do a remote lock instead of remote wipe (which could be undone if you go to a store in person and prove your identity).

AHAHAHAHAHA - Apple is not supposed to do nothing as they are not the Police.

Your wife in that case should contact the bank immediately and after contact the police. Then you can contact Apple when you're conscious and ask a remote wipe after answering all the security questions ;)
 
Really?

I hope someone gets fired over this.

This was highly unacceptable.

You do not know the policies at Apple (I agree probably not to just reset without confirmation first), but the person should be fired? Mistakes happen and if the same is applied next ticket you get you should be sent to prison?

No disagreement it is a bad one, but is it worse that it is a public figure so the punishment should match? Seems like the procedures should be confirmed and validated with the staff. Apple is responsible for ensuring the staff they have are trained correctly.
 
This looks bad for Apple. This looks bad for the journalist/blogger. This looks bad for the state of cloud computing. This looks bad for everyone.

This doesn't look like anything until we know the details. It could be anyone's fault, heck it could be no one's fault at all. Cloud computing could be the culprit and it could be simply the victim.

We don't know what "Clever social engineering" means, and until we do, forming an opinion about what has transpired is delving deep in the realm of fantasy.
 
Not to mention that we don't know what is accurate and what isn't simply because some of Matts intel comes right from the hacker whom we don't know who he/she is and we don't know what information they are providing and if it was accurate or not. I don't necessarily trust a person who just admitted to a computer crime and neither should we.

Actually that's a bit wrong. Our intel comes from the so called tech expert victim of the attack telling us that the hacker said nothing and what was said.

This is an expert that wasn't backing up his computer, the notion that things might not mean what he thinks they do or he's being vague to cover up his own guilt isn't far fetched
 
Wow. Some of you extreme fanboys seriously have some sort of chip on your shoulder. Give it up. Seriously.

This looks bad for Apple. This looks bad for the journalist/blogger. This looks bad for the state of cloud computing. This looks bad for everyone.

Seriously, get off your freakin' high horse and take a hard look at the issues at hand.

Some of you extreme fanboys seriously amaze me sometimes.

w00master
I'm sorry but this I need proof of what this person is saying. I'm not just going to take his word for it. Anyone can make allegations.
 
I doubt any Government employee would be using iCloud or any other public cloud service to store sensitive information! Nor would any serious business store sensitive information/data in a service they have no control over.

Did you miss the part where the guy remotely erased the computer?
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.