Some blamed the hackers and their blatant disrespect for people’s privacy. Some pointed their fingers on Apple and the fact that iCloud allowed an unlimited number of password attempts. Some went as far as sending disapproving looks in the direction of the models and actresses like Jennifer Lawrence and Kate Upton, whose nude photos were sent out into the world, as if the humiliation they went through was not enough.
How It Affects You
After the entire issue about photos of celebrities being leaked through the internet in August of this year, the question is now diverted from shifting blame to how the incident actually affects all of us. Of course, the biggest concern remains to be security. Considering the fact that I, as well as majority of the people I know, use Apple products and have iCloud accounts, it is in fact a little disturbing that other people can have access to what used to be seen as an almost unbreakable wall. Of course, no company is perfect and no one can ever claim that their system is 100% hack-proof. However, the fact still remains that every iCloud user is now at risk of having their accounts and all of their files compromised.
What’s Being Done About It
Apple CEO Tim Cook strongly believes that their servers still remain secure, and that the mishap was not their fault. Nevertheless, they are adding a few more precautions in place to help users regain their trust in their system. These steps include a two-factor authentication system where a user is required to provide two forms of access before being able to login to their account. These could be any two of the following: their password, an access key given upon signing up for the service, and a unique one time code. Notifications will also be sent to the user should there be anyone trying to access their account from a different location or device. Cook also warns users to heighten their awareness about phishing scams, where people are fooled into giving their security codes and other similar information to any third party that may use their access for similar malicious purposes.