News: Apple Says iPhone & iCloud Are Safe After Claimed Breach by 'Turkish Crime Family'
New statements from Apple make it clear that they do not believe a hacker, or group of hackers, breached any of their systems. This comes after a recent report from Motherboard that a hacker gang called the "Turkish Crime Family" is threatening to remotely wipe up to 559 million iPhones by April 7.The hackers claim they hold an alleged cache of stolen accounts, and their goal is to shake down the big Apple for $75,000 in Bitcoin or Ethereum cryptocurrency. Alternatively, in lieu of those options, they will even accept $100,000 in iTunes gift cards (a potentially risky option for them).Apple responded to the allegation that the hackers breached its systems, assuring their systems were not compromised, but did not confirm if the hackers do in fact hold an entire collection of Apple IDs and passwords. Whatever information they do have, probably came from previously comprised third-parties."If the list is legitimate, it was not obtained through any hack of Apple," an Apple spokesperson told Fortune in an email. "There have not been any breaches in any of Apple's systems including iCloud and Apple ID."Even if the data didn't come from an Apple breach, it could still mean your iCloud login details are out there. Fortune suggested that the logins could be from the LinkedIn hack, in which login info from 117 million accounts was sold on the black market site "The Real Deal." Though, if the Turkish Crime Family really has 559 million accounts, well, a mere fraction of the 117 million from LinkedIn doesn't really cut it.Don't Miss: The 4 Best Phones for Privacy & SecurityThe hackers have been sending login information to media companies in an effort to gather attention to their scam. For example, The Next Web received a small fraction of the alleged data from the hackers, and cross-referenced the info with the site Have I Been Pwned, which checks to see if your email or username has been compromised in a hack.Most of the samples provided to TNW don't appear to have been involved in the LinkedIn hack or other hacks in the Pwned database, but TNW was able to access the accounts with the login information provided by the hackers, so the info looks legitimate. They can't test every login, so the small sample may not be indicative of the whole.The Turkish Crime Family also noted to TNW that all conversations with Apple were actually kept private and never reported to Motherboard. Instead, the conversation between the Turkish Crime Family and Motherboard were led by a member that has now been removed for his "inaccuracy" and "lack of professionalism," an the group denies the authenticity of Motherboard's report. Overall, the hacking team seems to have a hard time sticking to one story.Now, the hacker group is confirming Apple's statement that its systems have not been breached, and that the stolen data was obtained through previously compromised systems over the last five years. The Turkish Crime Family is, in fact, not contradicting Apple. They did not breach the company, nor did they ever state to Motherboard that they stole the info directly from Apple.Rather, after Motherboard's breaking March 21 report, a breach was assumed by some news outlets such as BGR, though most media sites never directly stated that the hackers breached Apple. The Turkish Crime Family's initial response to Motherboard, and the group's only statement, was to extort Apple over an alleged cache of iCloud and other Apple email accounts. The group never stated where their cache of data came from until today when they contacted TNW in response to Apple.Don't Miss: 'Hackers-for-Hire' Attempted to Steal Baidu's Self-Driving Car SecretsCheck out the group's response to Apple, which they wrote and shared with TNW on Pastebin, a site where users can store text online for a specific period of time. Pastebin gets an unjust bad rap thanks to its popularity among cyber thieves, and is now being linked to yesterday's London attack. Image by Turkish Crime Family/Pastebin Yes, this could all be a game played by this hacking group to bring attention to their extortion efforts and gain publicity, but again, you never know.Don't Miss: 23 Important iOS 10 Privacy Settings Everyone Should Double-CheckChanging your iCloud passwords and all accounts associated with your Apple account password would be a good idea either way. Enabling two-step authentication is also a good safety step. To do this, go to Settings on your iPhone, select "iCloud," then tap your Apple ID and choose "Password & Security." Then, select "Turn on Two-Factor Authentication" and follow the prompts. This will ensure that no one can log into your iCloud account unless they have physical access to your device—even if they've hacked your password.Also, if you're too lazy to update all your passwords, you should check to see if your accounts have been hacked on Have I Been Pwned and change any passwords that are the same as the leaked ones associated with your email info. Once all that's taken care of, scroll through the Turkish Crime Family's Twitter and laugh at their spooky claims.In the same email to Fortune, an Apple spokesperson stated that the company is actively monitoring the situation and working with law enforcement to identify the criminals.Don't Miss: Advice from a Hacker: How to Create Stronger PasswordsFollow Gadget Hacks on Facebook, Twitter, Google+, and YouTube Follow Apple Hacks on Facebook, Twitter, and Pinterest Follow WonderHowTo on Facebook, Twitter, Pinterest, and Google+
Cover image via Max Pixel
I deleted Google from my life, and I can show you how to do it, too. After being a devoted Googler for many years, I realized putting all my data on one platform had its downsides.
How To: Easily Transfer Contacts, Photos & Calendars from iOS
Google Lens Will Turn Your Phone's Camera into a Smart AI
There are several features included in the wiring diagram which are optional and may not be included in your bar. The shielded cable will be an audio input to the amplifier/speaker. The single large black wire is the ground and all 12V lines are in the 19 conductor control cable.
Light Bar Draining Battery what did I do wrong? | LED Light Bars
How To: Completely Customize the LED Notification Colors on Your Nexus 5X or 6P Without Rooting How To : Get Nexus 6 System Sounds & Ringtones on Your Nexus 5 How To : Easily Root Your Nexus 7 Tablet Running Android 4.3 Jelly Bean (Mac Guide)
Add Some Color to Your iPhone's Notification Banners for
How To: Open Google Now Instead of S Voice with the "Hi, Galaxy" Command How To: Use the official Google Voice app on an Apple iPhone 4 (iOS 4.2) How To: Navigate Hands-Free Using Voice Commands How To: Replace Android's Voice Dialer with Google Now for Better Bluetooth Dialing
How-to Use Voice Dialer On An Android Phone - groovyPost
#3. Customize Swipe Gestures. Swipe gestures are both easy to use and easy to implement. While you're in your inbox, swipe left or right on a message and you'll either archive or delete the email. By default, Gmail will archive the email. However, by heading to the link below, you can learn how to change it to delete.
How to delete, not archive, Gmail messages on iPhone | Expert
Phones Apple's iPhone XS, XS Max, XR test the limits of your budget. You want to stay loyal to Apple? You're going to have to pay for the privilege.
Sony's latest flagship, the Xperia Z3, comes with some pretty high-end hardware, but what really draws me to it are the aesthetics of its ROM, Xperia UI. Even though my HTC One M8 can still go toe-to-toe with the Z3 in a performance matchup, there is something about Sony's UI that is simply missing from my HTC.
I have a problem with CorelDRAW on my Xperia Z « Smartphones
Culture Leer en español Royal Caribbean's high-tech ship lets you be lazier than ever. Self-driving shuttles. Servers who'll find you anywhere to give you a drink.
Redditors who switched from Android phones to iPhone - what
Du ville tro, at med hver større iOS-opdatering, ville der være færre måder at omgå låseskærmen. Desværre har Apples udviklere konsekvent mislykket hvert år siden 2013 i denne afdeling, hvilket efterlader åbne låseskærmutnyttelser til iOS 7, iOS 8 og nu den nyeste iOS-version, iOS 9, hvor hver udnyttelse opdages inden for dage efter OS-udgivelsen.
Get SMS on iPhone Remotely - listenforce.com
If the password method is too long and clunky, then consider the PIN or Pattern. (Chances are you won't need THAT much security, anyway.) Setting up lock-screen security. Decided on which one to
Obama signs bill "unlocking" cell phones that said it was illegal for consumers to "unlock" their cell phones for use on other networks cell phone unlocking is legal does not mean it will
Obama signs cell phone unlocking bill; It is now officially
I'm also leaving out Edge, as I didn't find much in autoplay blocking features. Chrome and Firefox Disable HTML5 Autoplay plugin. This plugin, available for Chrome (desktop version only) and Firefox, prevents HTML5 based videos from playing automatically. It covers most instances of autoplay videos I've found, though some can slip through.
How to Disable Autoplay Videos on Sites in Google Chrome
If you always resize images to the same fixed size, then the simplest long-term solution will be making an Automator workflow. You then drag and drop your images on it. Fortunately, the entire resizing can be done in one Automator action, so it's going to be a brief and simple workflow.
How to Resize Image or Photo « Software Tips :: WonderHowTo
0 comments:
Post a Comment