Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Why Isn't Apple a Leader in Security?

8/09/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmtuvntgvnzu3l2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

I believe Apple CEO Tim Cook when he says that he genuinely wants to protect iPhone owners. Much about the recently revealed harvesting of nude photographs of celebrities from cloud-based backups of their iPhones, backups they might not have even been aware existed, suggests that this attack worked in part because it never occurred to anyone at Apple that such photos would be so common as to attract hackers in the first place.

But that's me being charitable. It's also equally possible that Apple's leadership or security teams long ago made the calculus that it was better to save Apple the expense and effort of creating a stronger security perimeter around iCloud, hoping that it would never become an issue.
And here's why I feel comfortable saying something that cynical: Almost every security expert I spoke to in the course of researching this column was aghast that Apple has long left users of its iCloud backup service for iPhone so vulnerable.

And before anyone dismisses this as an issue that affects only celebrities, remember this: Evidence gathered by security specialists who immersed themselves in the hacker message boards where these nudes were being traded discovered that it wasn't just celebrities being hacked, but everyday folks as well. Often, people were targeted by someone close to them, someone nontechnical who simply wanted to invade their privacy, who would then team up with a willing hacker.

We don't know how often this sort of thing happened; it could be a few dozen people or it could be thousands. But as ever more of our life is stored in our smartphones and backed up to the cloud—including, potentially, financial and health data—all of those cloud backups of our smartphones' contents are going to become exponentially more attractive to hackers. They will become conduits for financial fraud, identity theft, revenge and general mayhem. They must be at least as secure as our bank accounts and primary email addresses, and thus far Apple's fixes for the iCloud hack don't measure up to the security measures protecting either.

To understand why, here's a brief primer on one of the ways everyone's iCloud backup of their iPhones—though not on by default—remains vulnerable. There are many routes into an online account, but often the best way is to ignore the "front door"—that form requesting your password—and try for a "back door." The most common one is the password recovery process.

To reset a lost iCloud password, users are asked "security questions" they previously answered. We've all created these before, and they tend to have answers like the name of your first boyfriend or girlfriend, or your mother's maiden name. The problem is that in an age of social media, where much of this information is either public or only one friend-request away, they are terribly insecure, and a favorite route used by hackers to penetrate accounts.`

This article has been extracted from http://online.wsj.com/, please click on this link to read the article in full http://online.wsj.com/articles/why-isnt-apple-a-leader-in-security-1410133526

Montash is a multi-award winning, global technology recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...