The Latest in IT Security

Celeb Photo Hack Leveraged by Scammers

02
Sep
2014

The recent incident in which pics of scantily clad or unclad female celebrities were leaked online rattled not only the interest of their fans but also of scammers, who tried to capitalize on the brute-force vulnerability used by the hackers for the deed. The content popped up on 4Chan and AnonIB starting Sunday evening, exposing more skin than celebs would have wanted; it is believed that the method used by the perps was to brute-force the login into Apples iCloud service, which did n…

Comments are closed.

Categories

TUESDAY, MAY 07, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments