time.com – Jennifer Lawrence Nude Photos, iCloud Accounts Hacked: How? | Time

The leak of personal photos of female celebrities, has tech observers questioning and debating potential vulnerabilities in Apple's iCloud.

Page Meta Tags

viewport width=device-width, initial-scale=1, maximum-scale=1, minimum-scale=1, user-scalable=no
keywords Apple,celebrities,entertainment,Hacking,icloud,Security,Tech
news_keywords celebrity, leaked, nude, pictures, photos, hacked, Jennifer Lawrence, Kate Upton, icloud, apple, find my iphone, is my icloud safe, iphone
description The leak of personal photos of female celebrities, has tech observers questioning and debating potential vulnerabilities in Apple's iCloud.
pinterest:url https://time.com/3247717/jennifer-lawrence-hacked-icloud-leaked/
twitter:card summary_large_image
twitter:url https://time.com/3247717/jennifer-lawrence-hacked-icloud-leaked/
twitter:title How That Massive Celebrity Hack Might Have Happened
twitter:description Tech experts say hackers may have gained access to cellphone pictures of Jennifer Lawrence, Kate Upton and others in the iCloud via the "Find My iPhone" app
pinterest:description The leak of personal photos of female celebrities, has tech observers questioning and debating potential vulnerabilities in Apple's iCloud.
twitter:site @TIME
pinterest:media https://api.time.com/wp-content/uploads/2014/09/486010307.jpg?quality=85&w=840&h=628&crop=1
twitter:image https://api.time.com/wp-content/uploads/2014/09/486010307.jpg?quality=85&w=840&h=512&crop=1
recaptcha-key 6LfZrtgZAAAAAJ8n221oa1YgG6cVvoOPgamCm6oT

Page Headers

0 HTTP/1.1 200 OK
Content-Type text/html; charset=utf-8
Content-Length 98174
Connection close
Date Mon, 16 Nov 2020 11:51:06 GMT
Server nginx/1.10.3 (Ubuntu)
X-Powered-By TIME BE-FE
Cache-Control max-age=86400
Content-Security-Policy-Report-Only default-src ‘self’ https: wss: data: blob: none: gsa: ‘unsafe-inline’ ‘unsafe-eval’; report-uri https://csp-endpoint.timeinc.net/
X-Frame-Options sameorigin
ETag W/”17f7e-TRBPN6E0H9GTe0QZBM82jZeeV0Q”
Vary Accept-Encoding,Accept-Encoding
X-Cache Hit from cloudfront
Via 1.1 0c9c133650294ca2485db2f5e74b2d11.cloudfront.net (CloudFront)
X-Amz-Cf-Pop IAD66-C1
X-Amz-Cf-Id 7dLzmXyN_jIr_wxbuqgZ-tTVwH3bXCagmmOVr3RUZXnXLchIPjfLOQ==
Age 1

Keyword Frequency

time 17
you 14
service 11
that 11
how 9
photos 8
it 8
tech 8
apple 8
icloud 7

Keyword Cloud

Jennifer Lawrence Nude Photos iCloud Accounts Hacked How Time U S Politics World Tech Entertainment Subscribe SUBSCRIBE Joe Biden Won Donald Trump Lost Election Protests Historic Wins Newsletter Close Sections Home Health Personal Finance by NextAdvisor Business Ideas Science History Newsfeed Sports Magazine Video The TIME Vault for Kids Edge Join Us Newsletters Give a Gift Shop the Store Reach Out Careers Press Room Contact Editors Customer Service E Asia Reprints and Permissions More Privacy Policy Your California Rights Terms of Use Site Map Connect with Security That Massive Celebrity Hack Might Have Happened Kate Upton at Los Angeles Premiere Other Woman Regency Village Theatre on April in Westwood Calif Jon Kopaloff FilmMagic Getty Images By Justin Worland September PM EDT Correction appended leak personal photos more than female celebrities nude otherwise has tech observers questioning debating potential vulnerabilities Apple s But those us who don t intuitively understand technology questions remain how could this happen it to me Here are some answers Who was affected An anonymous user posted like Hunger Games star model site Chan hacker claimed that there be posts total Some included confirmed authenticity Others Nickelodeon Victoria Justice were fakes did hackers do leading theory goes found vulnerability Find My iPhone service which helps users find lost or stolen phones via cloud typically protects its products from so-called brute force programs repeatedly guess random passwords given username until gets match reason various blogs have reported failed Hackers identified TheNextWeb reports allegedly used called iBrute gain access mdash consequently stored their accounts skeptical explanation though Most hacks occur through straightforward methods collecting data cellphone owned one example There also evidence came other devices wouldn back up Android What does say about all spokesperson told Re code company is actively investigating issue but provided few details reportedly rolled out security upgrade Monday just hours after first hack eliminate possibility gaining Could If indeed use method yet fix problem then short yes you Brute can applied so long as your said not collect broad amounts lot people would need target specifically I protect myself only way completely yourself internet stay off if want continue living st century two-step verification many services where set account asks two personalized before This makes much harder get them Also maybe think twice uploading original version article misidentified alleged role code-hosting GitHub theft Popular Lawyers Withdraw Key Fraud Claim Alaska Jetliner Hits Bear During Landing Amazon Pandemic Conspiracy Thriller Utopia Is Wrong Show Leadership Brief Conversations most influential leaders business Please enter valid email address Sign Up Now Check box wish receive promotional offers You unsubscribe any time signing agreeing our protected reCAPTCHA Google apply Thank For we’ve sent confirmation entered Click link confirm subscription begin receiving newsletters don’t within minutes please check spam folder Write justin worland com SHARE THIS STORY Read From Related Stories Next Inside Story Signal Editor x Pick EDIT POST br Around Globe Issues NOW top stories know now politics health Masthead copy USA LLC All Reserved constitutes acceptance Do Not Sell Information may compensation links website Offers subject change without notice