PS5 details: Is there a risk that hackers will exploit them?
inet infosec

PS5 details: Is there a risk that hackers will exploit them?

Sony's game developer and creator, Mark Cerny, gave some details about the new PS5 console. In one...
Read More
infosec

Cisco warns of vulnerabilities in 9000 series routers

Cisco has released 31 security tips this week, but has focused users on "critical" patches for ...
Read More
infosec

HP: Adds the Sure Sense malware blocker to its new devices

HP announced a series of updates and new features for PCs, as well as the official HP release ...
Read More
infosec

Covering vacancies in hacker security

Incidents of online attacks are increasing day by day. Previously no such attention was paid. After the incident with the ...
Read More
infosec

Oracle: New Critical Patch Update fixes 297 vulnerabilities

Oracle releases a collection of patches for multiple critical security vulnerabilities. The update contains 297 new security fixes ...
Read More
Latest Posts

The Fappening: Why do users upload nude photos to the cloud?

The story of The Fappening kicked off 2014, with hackers having since broke dozens cloud celebrity accounts by stealing personal files and then uploading them to the internet.

Usually these are photos and videos of inappropriate content which the offenders have managed to squeeze with simple hacking methods, proving once again that we need to be very careful with the passwords we choose.

Despite their arrests from time to time hackers, we still have leaks of personal photos and videos.

The latest leak is about naked photos Drake Bell while a few weeks earlier, The Fappening victims also fell on Peter Andre Blac Chyna and Charissa Thompson.

And here is where the following question arises: Why, after so many illnesses, naked celebrity photos are still being released on the internet? Since 2014 has not been taught a The Fappening lesson yet?

Unfortunately, users have a lot of confidence in companies that manage their data, often failing to take basic security measures.

On the other hand, hackers use more complex techniques to steal credentials and access cloud accounts where naked photos are stored.

Note that most of The Fappening violations were made through phishing scams asking for password reset. Hackers hosted pages apparently hosted by Apple on third-party servers and prompted renowned people to import their credentials by getting access to their accounts.

You need to carefully check the websites that enter your credentials as phishing scams are becoming more and more difficult to detect.

Also remember that companies such as Google and Apple will never ask for your password.

Finally, most Fappening leaks occurred because the photos were uploaded to the cloud automatically when backing up. Users could disable this feature and avoid hacking.

Fappening

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *