Personal Photos are easily access to hackers

While many of us take inane and uninteresting photos that we wouldn’t mind anyone seeing, some of us do like to share more interesting pictures with other individuals that we wouldn’t wish to be seen on the twitter feeds of millions. I am not personally interested in value judgements around taking nude pictures but I do appreciate the impact on those who have seen their intimate moments shared without their permission.
How were these pictures hacked?
The reality is going to be the work of cyber-security and forensic experts to discover. But as there are now so many private photo streaming services, the potential for exposure becomes very likely.
There are three main ways your photos could be vulnerable to hackers.

Sharing passwords across different sites

One vulnerability is if you use the same password for more than one account online. Taking a look back to theOleg Pliss hack in May, cyber-criminals managed to compromise iCloud by using indirect hacking, social engineering and innovative thinking.
Assuming people used the same password on more than one service, the hackers attacked another unrelated system then managed to systematically test each @icloud email account to see if they could get into the cloud with the same password.
The same applies to any other private photo storage or cloud-based account. The technology by itself is secure, but if you use the same passwords for multiple services and have been unknowingly part of an attack, then the rest is quite obvious.

Targeted attacks

Alternatively, you can fall victim to a targeted attack by being sent targeted emails, files or even given amemory stick with compromised files on it. It does not take too much effort to get a trojan keylogger onto someone’s computer if you really want to.
Once the keylogger is at work, it will send screen-shots of each mouse click, key stroke and other activities back to the hacker. Internet speed is now so advanced that you would not notice the traffic.

Public hotspots

Finally, if you have a laptop or smartphone with personal photos on it and use it on a public hotspot, there is the potential for compromise. Firesheep, among other applications, allows hackers to compromise any device on a public system.
The man-in-the-middle attack is an old compromise taught to many network engineers as a way of defending networks. It is not a complex process, and it deceives a wireless access point into letting one computer become the gateway for all devices on the network. This would allow hackers to see all traffic and therefore images being sent across the system.

What can you do?

There are steps you can take to reduce your vulnerability to attack. Consider where you store any pictures that you wouldn’t want the public to see. Consider how up-to-date your anti-malware software is and alsowhat passwords you use on different systems. If you are using photo streaming services, check now to see if private photos are already at risk of being exposed to the internet.
If nothing else, the story of this mass leak of images has exposed how many of our own photographs are being unwittingly shared with cloud services which may be compromised. Whether we’re celebrities or nobodies, we must all be vigilant in protecting our private data in these increasingly insecure times.
SHARE

Milan Tomic

Hi. I’m Designer of Blog Magic. I’m CEO/Founder of ThemeXpose. I’m Creative Art Director, Web Designer, UI/UX Designer, Interaction Designer, Industrial Designer, Web Developer, Business Enthusiast, StartUp Enthusiast, Speaker, Writer and Photographer. Inspired to make things looks better.

  • Image
  • Image
  • Image
  • Image
  • Image
    Blogger Comment
    Facebook Comment

13 comments:

  1. University of Maryland University College offers several different bachelor degree options including Cyber Security Management and Policy, Computer Networks and Cyber Security, and Software Development and Security. cyber security course in hyderabad

    ReplyDelete
  2. Thumbs up guys your doing a really good job. It is the intent to provide valuable information and best practices, including an understanding of the regulatory process.
    Cyber Security Course in Bangalore

    ReplyDelete
  3. Very nice blog and articles. I am realy very happy to visit your blog. Now I am found which I actually want. I check your blog everyday and try to learn something from your blog. Thank you and waiting for your new post.
    Cyber Security Training in Bangalore

    ReplyDelete
  4. I will really appreciate the writer's choice for choosing this excellent article appropriate to my matter. Here is deep description about the article matter which helped me more.
    Best Institute for Cyber Security in Bangalore

    ReplyDelete
  5. After reading your article I was amazed. I know that you explain it very well. And I hope that other readers will also experience how I feel after reading your article.
    Ethical Hacking Course in Bangalore
    Certified Ethical Hacker Course

    ReplyDelete
  6. Wow! Such an amazing and helpful post this is. I really really love it. I hope that you continue to do your work like this in the future also.
    Ethical Hacking Training in Bangalore
    Ethical Hacking Training

    ReplyDelete
  7. Wow what a Great Information about World Day its exceptionally pleasant educational post. a debt of gratitude is in order for the post.

    Data Science Course

    ReplyDelete
  8. It is the intent to provide valuable information and best practices, including an understanding of the regulatory process.

    Data Science Training

    ReplyDelete
  9. Interesting post. I Have Been wondering about this issue, so thanks for posting. Pretty cool post.It's really very nice and Useful post.Thanks..

    Data Science Courses

    ReplyDelete
  10. The web site is lovingly serviced and saved as much as date. So it should be, thanks for sharing this with us.

    Data Science Certification

    ReplyDelete
  11. Networks can be created using telephone lines, cell phones, cable TV, Ethernet cables, and with wireless routers. Routers are used to assign temporary IP addresses to devices connected to the local area network the router controls and to "route" data packets around a network to the correct devices. 198.168.0.1 Password Change

    ReplyDelete
  12. This will help demonstrate the routing side of the CCNA course involving topics such as OSPF, EIGRP, RIP and other routing protocols. CCNA course in Pune

    ReplyDelete