By now you’ve probably heard about the avalanche of celebrity nude photos that slammed the Web on Labor Day. But amid the chaos of FBI investigations, celeb denials and Apple PR releases that say basically nothing, understanding how the attackers executed the hack — and how to prevent it from happening to you — hasn’t been so clear.
Apple recommended that all users enable two-step verification “to protect against this type of attack,” but the truth about iCloud’s two-step security is a little more complicated than Apple’s letting on, and turning it on probably wouldn’t have prevented the celebrities’ pics from getting hacked in the first place.
To help sort through the confusing mess, we’ve broken down everything you need to know about iCloud’s security and how you can use two-factor authentication and other security steps to keep some perv named 4chan from blasting your nips all over the Internet.
If you make something private, obviously you want it to stay that way. But with hackers trying to get at your data, you need to be prepared. Following the recent iCloud hacking that leaked tons of private celebrity photos, there’s a renewed focus on security.
In today’s video, we show you how to enable two-step verification on all your Apple devices so you’ll have a better chance of keeping everything that’s near and dear to you private and secure.
Last month, a number of Apple users in Australia woke up to find that their iOS devices had been locked by an “Oleg Pliss,” and that they needed to pay a ransom if they wanted to continue using them. While a few people thought iCloud could have been hacked, Apple denied those rumors.
Now it seems that the hackers involved with the ransom demands have been detailed by authorities in Russia, according to a new report from the Sydney Morning Herald.
Aged 17 and 23, the alleged hackers are both residents of the Southern Administrative District of Moscow, and one has been previously tried for a similar case.
Apple says that iCloud was not hacked, following on from the news that a number of iOS and Mac users in Australia, New Zealand, Canada, and the U.S. report have had their devices remotely locked in exchange for ransom.
It’s been speculated that the hacking in question was done using login credentials gained from users as a result of recent data breaches and then used as Apple ID logins to lock users out via iCloud. While this may be the case, Apple says that it is not the result of the iCloud being compromised in any way.
Watch Dogs promises to be more than just the standard run and gun shooter game, with some pretty amazing open-world and multiplayer tech.
Ubisoft’s upcoming Watch Dogs console game is hoping to upend the traditional boundaries between single- and multi-player gaming, allowing you to hack into other players’ games on the fly, earning experience and renown points which you can then use to level up your own character’s skill levels.
The game was a huge surprise at last year’s Electronic Entertainment Expo (E3), and has since been getting a ton of attention from gamers and the press as the May 27 release date looms.
Even better, you’ll be able to interact with the very same game and players via a free mobile app, letting you increase the heat on rogue players, as you can see in this fairly long and detailed play through video below. Sure, the video is ridiculously longer than most gamer’s attention spans, but it’s well worth a look.
Paper is quickly becoming a thing of the past, so we’re offering you a three-year digital subscription to Hacker Monthly that you can enjoy on any device you want (PDF, MOBI, EPUB format), DRM-free for the price of just one year. Plus, you get access to all current and past issues immediately after your purchase.
T-Mobile finally has the iPhone 5. It’s great, and cheap, but unfortunately its data speeds are slower than an iPhone 5 on AT&T. Not satisfied with their slower iPhone 5s, Joseph Brown and Sky Zangas did some digging around in carrier update files and figured out a way to boost data speeds on the T-Mobile iPhone 5.
To get faster data speeds on T-Mobile’s network with the iPhone 5 all you have to do is install a custom carrier update. That sounds like a tough task, but it’s actually pretty easy, and thanks to the guys at TmoNews, here’s a quick guide on how to do it:
Last week we asked you guys to show us just how amazing you can make your iPhone look with tweaks and hacks for the homescreen and lockscreen, and boy were we impressed. We received over 100 entries in the jailbreaking contest and pretty much all of them were spectacular.
To celebrate the launch of our new Flickr and Instagram groups, we’re giving the 10 best jailbreak screens a free copy of Kuvva Wallpapers. After some serious deliberation, we think we’ve got some drool-worthy winners.
It’s only been a few weeks since the first lockscreen hack was discovered on iOS 6.1, but some researchers have already discovered a new way to bypass the iPhone’s lockscreen without entering the security PIN.
The bug was found in iOS 6.1 by Benjamin Kunx Mejri, and it follows some of the steps as the last exploit but has some variation in the steps, and it allows an attacker to access all your data by plugging your device into a computer’s USB port.