Friday, January 2, 2015

State your iCloud password on this list? Change for the hacked – The Latest News

By: editors
2/01/15 – 20u23 Source: gizmodo.com
© RV.

iCloud hack A few hours ago, someone posted an online tool to hack iCloud. The hacker claims to be a new and “painfully simple method to have developed to crack passwords of Apple IDs. The additional security features, which developed after Apple’s recent nude pictures scandal, the test would not pass.



IDICT, so hot The new tool was posted on GitHub, and that the security of iCloud can be circumvented.

In addition to bypass the login details would also IDICT have an answer to the so-called “two-step verification” from Apple. This double security mechanism of the Apple ID normally there would have to ensure that even when someone has overtaken a user’s password, that person still has no access to the account. Only when the identity of the authenticating person is further verified by a code on one of the two trusted devices of the ID holder in question, access is granted.

However, the designer of IDICT late now also know that personalized double security found a hole. Different voices on Twitter confirm that claim.

500 lines passwords

According to the hacker is the security hole iCloud moreover “painfully obvious”, he writes on GitHub. Yet iCloud users do not have to worry too much worry: the capabilities of the tool appear still restricted by the limited size of a table on which he relies to guess the passwords of Apple users.

Just whose password on the long list of 500 lines long IDICT state, is in danger of being hacked. So if you are in possession of a simple and frequently used passwords à la Paswoord1, P @ swoord, Iloveyou1 or Blink182, you might set would be better as in another.

Awareness

Fortunately, the person not IDICT uploaded immediately evil intentions to quit after, on the contrary. He aims to show how easy it apparently still is to gain access to supposedly highly secure accounts. Not only does he want to sensitize people aware to deal with personal information on the net. Even Apple itself he wants to encourage in order to eliminate the weaknesses in their system.

This appears necessary because it is not so difficult to expand the limited word list IDICT according to the hacker. If that happens may be a new large-scale leak.

LikeTweet

No comments:

Post a Comment