Page 359 -
P. 359

Security Guide






                        diGital iS Forever








                    Have you ever told a friend something and asked     numerous servers until it is delivered to the intended recipi-
                    him or her to keep it private? Most people have. Unfortunately,   ent. It will also be stored on a data farm owned by the com-
                    at some point, the person you confided in violated your trust.   pany whose app you’re using. You can never withdraw this
                    He or she shared that information with someone else. If so,   information—and once it is transmitted, it is nearly impos-
                    you can probably recall the horrible feeling that accompa-  sible (and in most cases, impossible) to delete.
                    nied the thought of other people knowing things you wanted   Think about it this way. Have you ever heard the saying
                    kept private.                                       that “two can keep a secret if one of them is dead”? Well,
                       This is how several A-list celebrities felt when scores of   from a technology perspective, “two can’t keep a secret if one
                    their personal  and highly  sensitive photos stored in  iCloud   of them is the Internet.” Anything shared over the Internet
                    were hacked and subsequently plastered all over the Internet.   morphs  into  a  digital  zombie,  destined  to  wander  the  far
                    You may be wondering how this could happen—how could   reaches of cyberspace forever!
                    cybercriminals access the private data of someone else stored   You may think that as long as you are sharing messages
                    on an iCloud account?                               or photos with  a trusted party you have  nothing to worry
                       It  turns out  there  was a security  vulnerability  associ-  about. Unfortunately, our digital world is rife with cybercrim-
                    ated  with  Apple’s  Find  My  iPhone  application.  Safeguards   inals who spend countless hours  trying  to steal data from
                    had not been implemented by Apple to limit the number of   both  companies  and everyday citizens (just  ask  the  Apple
                    login attempts permitted before an account would be locked,   iCloud victims).
                    a common security practice used to prevent
                    hackers from entering endless combinations
                    of usernames and passwords in an exhaustive
                    attempt to guess the correct set of credentials
                    (referred to as a brute-force attack). 50
                       The celebrities affected  by  these attacks
                    are still trying to remove their private data from
                    the Web. The sad truth is that their private data
                    will never completely be removed. Even more
                    sobering is the fact that anyone who chooses
                    to transmit any personal information using an
                    Internet connection (i.e., send something  via
                    email, post something on a social media site,
                    etc.) can become a victim, too.
                    Privacy? What’s That?

                    Once you click the button to send an email,
                    post a photo, or share a video, you lose control
                    over that data. It can be copied, shared, and
                    copied  again. Your  data  will  travel  through
                                                                                            Source: valdis torms/Fotolia and vilisov/Fotolia




                358
   354   355   356   357   358   359   360   361   362   363   364