"There are so many vulnerabilities out there and so many ways for people to compromise our security. "It really makes sense to look globally at what are the things everyone can do," Cowan said. Many of the photos have been confirmed as being genuine, most notably by Lawrence. When two-step verification is set up, a user trying to log onto their account from a new device must verify their identity from a second device before they are granted access. "You’re more likely to get caught in the net than get tricked by the bait."Īpple recommends that users protect themselves form this type of attack by using a strong password and two-step verification - which is offered by a variety of top cloud hosting services. Think about it as more like fishing with a net than with a fishing pole," he said. "Cyber attackers are confidently launching an attack against everybody. REUTERS/Lucas Jackson Jennifer Lawrence was one of the celebrities targeted by iCloud hackers. But according to Reuters, Lively’s publicist says they were 100 fake. "The largest and most damaging attacks come from hackers who collect passwords and then exploit the fact that we all re-use our passwords on multiple websites," David Cowan, a cyber security expert at Bessemer Venture Partners and the co-founder of Verisign, told ABC News. In 2011, a series of five nude photos allegedly belonging to Lively hit the web.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |