Security & Mobility Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
ktom

How a Hacker Can Gut the Core of Your Apple Digital Life?

by Juniper Employee ‎08-10-2012 10:08 AM - edited ‎08-10-2012 10:08 AM

By now, you may have heard the gut wrenching story of Mat Honan’s digital life gone awry…iPhone, iPad, and MacBook all wiped clean in an instant. Mat lost all his baby daughter’s photos with no backup.  His Amazon account compromised…AppleID account infiltrated…Twitter account trashed and used for spreading hateful language.  These treacherous events all happened within one short hour. Where does this nightmare end?  How did it happen all to one guy?  Is he the only guy?  The scary part is “no.”  He’s just one of many.  Luckily, he has the journalistic platform to share his pain with big business and with us.  Hopefully the likes of Amazon and Apple have learned from Mat’s ordeal.  This story is just one of many lessons as we live and learn in our digital lives.

 

Here’s the bottom-line, hackers pieced together Mat’s information from Amazon, Apple, and the Internet to gain unauthorized access to his accounts. Here’s Mat’s full story.

 

Honan’s assessment of the problem stems from this one credit card fact and its many implications, “The very four digits that Amazon considers unimportant enough to display in the clear on the web are precisely the same ones that Apple considers secure enough to perform identity verification.”

 

Apple and Amazon have acted quickly with some stopgap measures.  Apple has temporarily suspended the ability to reset passwords over the phone (i.e. only online via iForget system) and Amazon has instituted a more stringent customer verification process (details undisclosed at this time).  In due time, we’ll see what their respective long term plans may be to protect us, their highly-valued customers.

 

They’re taking action, but it’ll take time. So, what can we do now? Do your own due diligence and protect yourself. As Mat Honan recounts, he’s ultimately mad at himself for not taking more precautions.  So be wise and learn from Mat. Backup your irreplaceable photos, precious video footage, and confidential data.  Be careful about daisy-chaining accounts.  And be smart about establishing two-factor authentication. 

 

Be safe out there.

 

If you have any other quick tips, please share. 

Comments
by H Phillips (anon) on ‎08-16-2012 05:53 PM

This article drives home the point of how easy it is to be compromised.   http://www.daisolutions.net/blog

Post a Comment
Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
About Security & Mobility Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Paul Bristow
Senior Director
Product Management

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Henrik Davidsson
Director
Security Sales

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Steve Hanna
Distinguished Engineer

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Seema Kathuria
Manager
Product Marketing

Profile | Subscribe

Kevin Kennedy
Senior Director
Product Management

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Galina Pildush
Strategy & Planning
Architect

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.