Guess i'm safe... "what city did you grow up in?"
"Xgs4k-l39&h-l3d*3-Je(3l"![]()
We must have been neighbors.
Guess i'm safe... "what city did you grow up in?"
"Xgs4k-l39&h-l3d*3-Je(3l"![]()
They should have thought this ahead before the damage is already done.
This type of poor management of sensitive data reminds me of Microsoft, ie; Damage control policy, let the bad things happen then look for ways to prevent them from happening again.
Explain. Are you saying you were issued a temporary password after answering the security questions right then and there in the browser instance you were using to reset the password? Are you saying you didn't have to confirm the reset by clicking a link in a verification email they sent you?
Guess i'm safe... "what city did you grow up in?"
"Xgs4k-l39&h-l3d*3-Je(3l"![]()
Er... yep. As a user I have two ipads, a iphone 5, a Samsung tab, a nexus 7 and a galaxy s4 and use both Apple and Google services on a daily basis.
As as business owner we provide a cloud service with two factor authentication, notifications to beat the band , aes 256 encryption on all data entered, SHA2 on passwords with random salts , IP blocking, account lockouts, traffic pattern matching etc etc etc.
That and over 30 years in the business gives me a good perspective on what good and bad security is.
Of course in the end it all just my opinion![]()
Well Google for one. Change any email, password or anything else on Google and they let you know. They also have two factor security for quite a while now.
It thinks this is (yet) another example of how Apple just doesn't get cloud. This stuff is basic and should have been there since the very start -not an afterthought. They have the resources, they just don't have the mindset.
Glad that Tim Cook himself is speaking up and Apple is actually showing responsibility by making changes to security. Old Apple under Steve Jobs would stonewall for as long as possible, hoping that the story would go away.
They should have thought this ahead before the damage is already done.
This type of poor management of sensitive data reminds me of Microsoft, ie; Damage control policy, let the bad things happen then look for ways to prevent them from happening again.
They need to halt the restore until you authorize the action either with trusted device or secure backup key... Notification after the fact, is of questionable value...
They should have thought this ahead before the damage is already done.
This type of poor management of sensitive data reminds me of Microsoft, ie; Damage control policy, let the bad things happen then look for ways to prevent them from happening again.
Trust me I can write down some security questions which will be impossible to find out unless you are actually me. Everyone can do that. And nobody should be using hometown or birthdate as a security question.
----------
No. The passwords were not brute forced, as been said many times before. The Find my iPhone brute force script was not used to hack these celebrities accounts. Their security questions were "guessed". That's the official word out at least. Unless you have some information we don't have, please share it.
Well Google for one. Change any email, password or anything else on Google and they let you know. They also have two factor security for quite a while now.
It thinks this is (yet) another example of how Apple just doesn't get cloud. This stuff is basic and should have been there since the very start -not an afterthought. They have the resources, they just don't have the mindset.
Not if you enable 2-factor authentication. Then they will not be able to change your password, so they won't be able to get at your iCloud data.
That is not what happens generally.
Read the forums at AnonIB, where these "hacks" are frequent.
The article says they are expanding 2-factor auth. Presumably that means they are expanding it to prevent restores / slurping of data unless you have the password AND a trusted device.
I believe that's exactly what will happen if you have 2-factor auth turned on for your account and running iOS 8. 2fa will apply to iCloud backups in iOS 8.
They don't need to change your password when they already know it. And that is very possibly the case in many of these situations. Either you use something stupid easy or you fell for a phish on another system and use the same password for everything.
it's unlikely that the big boys will ever get together to recreate some kind of unified list so that you can't use the same password on Apple, Facebook etc cause the systems will reject it so they have to rely on folks not being dumbasses about their information and identities. But as this online world is still young, stupid is out there in droves.
----------
Recycled passwords happen a lot. Probably as much if not more than resetting them.
Remember the whole find my iPhone random attack that was big in Australia and New Zealand a few months back. Those folks had no clue that anyone else had access to their accounts. They got no "Your apple id password has been changed" messages etc. and if someone had changed the password, that would have disconnected their devices from the account until the new one was entered into the device so the stunt wouldn't work. Someone had the existing password. And one of the many hacks or phishs on systems like yahoo, Facebook etc is likely the source.
a site where anyone can say anything without proving it to be true. Including claims of hacking iCloud (with the implication they hacked the servers itself) to gain huge press via the Apple name dropping and thus look like a BOFH
And how, under the current system, is that supposed to work for folks that only have an iPad, which can't receive SMS without being fully activated and signed into an apple id that also exists on the iPhone they don't have while both run iOS 8 etc. Or they have an iPhone which isn't functioning cause it went into the pool and won't turn on and they are trying to restore their data to a new iPhone. An iPhone that isn't trust and can't be trusted because they would need access to a previously trusted device to trust the new device even just to sign into iCloud after setting up as new, otherwise the whole system of only being able to backup to a trusted device falls apart.
They did think of this before the damage was done. A year and a half ago Apple released 2-step verification. Had those celebrities enabled 2-step verification, this wouldn't be an issue.
Well, this sucks because I don't even want it. I just want an option to disable the password reset. 2-step authentication is an ugly and complicated fix for a problem that shouldn't even exist. Anyone can reset the password only by answering security questions. There's not even a verification email! And people ask why I always use a fake birthday for online accounts…
You cannot restore / download a backup w/o the device being added to trusted list first.
Maybe there should be a configurable delay. Waiting a half-day for a restore is better than Apple sending all your dumb selfies to some foreign hacker immediately.
Now what will Samsung do for R&D if they can't peek on iCloud data from Apple employees?
Security is not an afterthought at Apple. They already have two-step verification and overall good security. They just continue to push it further.
And how are you going to do that when the only trusted device you had was your iPhone which took a total dump and isn't even powering on. No way is Apple going to risk the crap pile of saying you have to have your iCloud recovery key or screw getting your information back.
Apple still hasn't addressed or admitted to their initial screw up that led to all of this.
First off, try using 2-step authentication in countries outside of the few Apple supports it in (it just isn't possible).
Also, it may not be an afterthought... But the fact that you can reset your password without any true verification is not true security. Google, Yahoo, and most companies don't allow you to reset a password by just answering common questions. Most companies use a 2nd verification source (for Google is is your phone number via sms or phone call or an alternate email). So no matter how well Apple secures their data, it really isn't secure if almost anyone can have their password reset by answering a few questions and not needing access to the users phone or email.
Well, that wouldn't be the case with all the improvements that are being made, including 2FA applying to being able to get the backup (unless the user doesn't use it, in which case it's a user-end/end-user issue really).So when the so called hacker is already restoring all the data to a phone or a forensic program all we get is an e-mail telling us "hey all your dumb selfies are being downloaded by an unknown person"?
Everybody can enable 2-factor authentication (oh wait, they can't in every country for Apple ids), but that doesn't mean they will. The fact is, Apple's password recovery system requires no verification other than the questions that are setup by the user. That is poor design. There is no other way to say it and no one should find their system acceptable. You can guarantee Apple is going to fix their implementation.
There will be a 12 hour delay before you can restore your iCloud backup or access your account to retrieve your contacts etc"
"I'm going to lose thousands of dollars if I can't call my clients. I know my password, why can't I just download it now. ".
I'm sorry but what Apple screw up was that. There is zero evidence that anything Apple did or didn't was the issue. Even this whole 'unlimited tries' thing hasn't been proven to be the issue. If anything that is just a free bumper to folks that don't understand that the real issue is that their cell service blows.
Apple's servers weren't hacked. Apple's reps didn't hand out the password to someone over the phone without verifying the callers id etc.
The real fault could have been recycled passwords, using security questions that could be found with a quick google, not setting up two step to stop password resets etc.
They have fixed the issue, but it doesn't appear that it was really involved with all of this.We know their servers weren't hacked directly but we also know that they made the guessing of passwords (good or bad) much easier by not placing a limit on guess attempts. That's the fault of Apple I'm talking about and they have already "admitted" to it by fixing it quickly.
They have fixed the issue, but it doesn't appear that it was really involved with all of this.
Google's security if you don't enable 2-Step verification isn't any stronger than Apple's.