{"id":31324,"date":"2014-09-02T08:17:26","date_gmt":"2014-09-02T15:17:26","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=31324"},"modified":"2014-09-02T15:37:59","modified_gmt":"2014-09-02T22:37:59","slug":"mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/","title":{"rendered":"Mystery Surrounds &#8220;iCloud Hack&#8221; as Naked Celebrity Photos Leak"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-31333\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/celeb-hack-wide-600x300.jpeg\" alt=\"Jennifer Lawrence in The Hunger Games\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/celeb-hack-wide-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/celeb-hack-wide-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/celeb-hack-wide-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><br \/>\nYou would have had to have been sleeping under a rock for the last day or two not to have seen the headlines about female celebrities whose naked selfie photographs have somehow <a title=\"Naked pictures of Jennifer Lawrence and other celebrity starlets leak online\" href=\"http:\/\/grahamcluley.com\/2014\/09\/naked-jennifer-lawrence-leak\/\" target=\"_blank\">slipped out onto the internet<\/a>.<\/p>\n<p>Most attention has been given to the candid photographs of Oscar-winning actress Jennifer Lawrence, model Kate Upton and recording artist Ariana Grande, but the truth is that about 100 other actresses, models and pop stars have had their private naked photographs shared widely on the internet.<\/p>\n<p>The story first broke on Sunday, when links began to be posted on 4Chan image-sharing forum and Reddit alongside claims that suggested that iCloud had been hacked.<\/p>\n<p>iCloud, of course, is Apple&#8217;s cloud storage and backup service &#8211; designed to make your life more convenient if you&#8217;re using Apple computers or iPhones, not to leak photos that you probably only intended your boyfriend or husband to see.<\/p>\n<p>But many iPhone owners are possibly oblivious to the fact that every time they take a photo, it is invisibly and silently uploaded to iCloud in the background, entering your Photostream, meaning that it can be easily accessible from any other Apple devices you own.<\/p>\n<p>That&#8217;s not necessarily always a bad thing.<\/p>\n<p>I mean, lets face it, your photos are special to you and many of them will have significant sentimental value. The beauty of something like the Photostream or automatic iCloud backups of your data is that it doesn&#8217;t matter if you lose your phone or drop it in the bath, you won&#8217;t have lost your precious photos and other data.<\/p>\n<p>But, of course, there might be ahem&#8230; some images that\u00a0you wouldn&#8217;t feel comfortable being automatically shared anywhere, which you might want somewhat more paranoid and tighter control over because of their umm&#8230; content.<\/p>\n<p>Because if a hacker managed to hijack your iCloud account, they could download all of your photos without ever having to gain physical access to your iPhone.<\/p>\n<p>It&#8217;s important to stress at this point that there has been no firm evidence that hackers have exploited a security hole in iCloud to help them access the female celebrities&#8217; accounts, but the theory has gained ground when proof-of-concept code was uploaded to Github this weekend that used cracking techniques to guess passwords for accounts.<\/p>\n<p>The code, named &#8216;iBrute&#8217;, allegedly exploited a vulnerability in the Find My iPhone API, and was created by security researchers Andrey Belenko and Alexey Troshichev.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-31336\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/github.jpeg\" alt=\"Github code\" width=\"600\" height=\"617\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/github.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/github-145x150.jpeg 145w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/github-291x300.jpeg 291w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Although iBrute suggests it uses &#8220;brute force&#8221; to crack the passwords, it actually uses a dictionary attack &#8211; throwing the most popular passwords revealed by past data breaches to see if any of them stick against the wall.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-31342\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/dictionary-attack.jpeg\" alt=\"Dictionary attack\" width=\"600\" height=\"273\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/dictionary-attack.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/dictionary-attack-150x68.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/dictionary-attack-300x136.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Regardless of whether it&#8217;s a brute force attack or a dictionary attack, the point is that Apple appears to have been failing to properly rate limit failed attempts to access an account.<\/p>\n<p>Apple is said to have now fixed the flaw, which had meant that hackers could rapidly try thousands or even millions of possible passwords in rapid succession, to see which would unlock the door.<\/p>\n<p>But what&#8217;s not known is if anyone else was aware of the flaw, or whether other security holes exist in iCloud&#8217;s security that could have allowed hackers&#8217; access to private data.<\/p>\n<p>This last weekend, Defcon in Saint Petersburg were given a presentation by Belenko and Troshichev, detailing weak points in iCloud security.<\/p>\n<p>They confirmed that the Find My iPhone API failed to lock out users who failed to enter the correct password on multiple occasions, and that users&#8217; iCloud security codes &#8211; which are separate from iCloud passwords &#8211; might also be vulnerable to brute force attacks as they are typically only four characters long.<\/p>\n<p>In Troschichev and Belenko&#8217;s opinion, you should never rely upon a four digit iCloud security code &#8211; but choose something more complex instead.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-31339\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/security-code.jpeg\" alt=\"iCloud security codes, as explained at Def con St Petersburg\" width=\"600\" height=\"440\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/security-code.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/security-code-150x110.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/security-code-300x220.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>According to Apple iCloud support, &#8220;If you enter an incorrect iCloud Security Code too many times when using iCloud Keychain, your iCloud Keychain is disabled on that device [and] your keychain in the cloud is deleted.&#8221; You then have to access your account from another device.<\/p>\n<p>Is it possible that the 100 celebrity victims could have had their accounts broken into in this way? To be honest, it&#8217;s hard to imagine that such a thing would be possible &#8211; and if it were true, it would throw Apple into a very poor light for not doing more to detect the suspicious activity against its servers.<\/p>\n<p>The truth is that right now, we just don&#8217;t know. Other factors could have played their part including phishing, the unsafe reuse of the same passwords on multiple websites, or someone close to the celebrities leaking information or meddling with their online accounts.<\/p>\n<p><strong>RELATED:\u00a0<a title=\"Did Jennifer Lawrence\u2019s Naked Photos Leak Out Because She Told the Truth? (How Lying Can Protect your iCloud Account)\" href=\"https:\/\/www.intego.com\/mac-security-blog\/did-jennifer-lawrences-naked-photos-leak-out-because-she-told-the-truth\/\" target=\"_blank\">Did Jennifer Lawrence&#8217;s Naked Photos Leak Out Because She Told the Truth?<\/a><\/strong><\/p>\n<p>Unfortunately, one character in this story who could possibly shed some light, hasn&#8217;t got very much to say for itself at the moment.<\/p>\n<p>Apple spokeswoman Natalie Kerris issued a curt response to journalists&#8217; questions about the celebrity hack, which failed to dispel any concerns that it might be its own systems that were found lacking:<\/p>\n<blockquote><p>&#8220;We take user privacy very seriously and are actively investigating this report.&#8221;<\/p><\/blockquote>\n<p>Clearly with the launch of the long-anticipated iPhone 6 (and possibly an iWatch too?) just days away, Apple is keen not to have any bad news distracting attention.<\/p>\n<p>Some things we can be certain of, however.<\/p>\n<p>Make sure that you are using unique, hard-to-crack passwords for your iCloud account, and protect your account with two-factor authentication.<\/p>\n<h3>How to make your iCloud account harder to hack<\/h3>\n<p>Whether it is determined that a security hole helped hackers access iCloud accounts or not, it&#8217;s clear that other threats could put your online data and photographs at risk. For instance, phishing continues to be a thriving business, and it is becoming increasingly common to see iCloud accounts targeted just like online banks, PayPal, or social media sites.<\/p>\n<p>To better protect your iCloud account, and prevent a hacker from accessing your backups, use <a title=\"Apple Now Allows Two-Factor Authentication\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-now-allows-two-factor-authentication\/\" target=\"_blank\" rel=\"nofollow\">two-factor authentication<\/a>.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-26953\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/apple-2fa.jpeg\" alt=\"Apple 2FA\" width=\"600\" height=\"195\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/apple-2fa.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/apple-2fa-150x48.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/apple-2fa-300x97.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Two-factor authentication (sometimes called two step verification) makes life much harder for hackers attempting to hijack control of your accounts and devices, as it means they require more than just your username and password. They also need a one-time password (OTP) that is sent to your device itself.<\/p>\n<p>In addition, you can set up a 14-digit recovery key that you can print out and keep in safe place. Apple suggests you keep the recovery key to regain access to your account, or if you ever lose access to your devices or forget your password.<\/p>\n<p><strong>Do you use Apple iCloud? Do you think Apple users take security seriously enough? Leave a message below sharing your thoughts.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As nude photos of Jennifer Lawrence and other female celebrities pop up on the net, learn more about how you can make your iCloud account harder to hack.<\/p>\n","protected":false},"author":34,"featured_media":31330,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,5],"tags":[3151,1342,1357,1348,1345,1117,377,477,171,1351,1336,1339,1333],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"As nude photos of Jennifer Lawrence and other female celebrities pop up on the net, learn more about how you can make your iCloud account harder to hack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mystery Surrounds &quot;iCloud Hack&quot; as Naked Celebrity Photos Leak - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"As nude photos of Jennifer Lawrence and other female celebrities pop up on the net, learn more about how you can make your iCloud account harder to hack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-02T15:17:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-09-02T22:37:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/celeb-hack-featured.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/celeb-hack-featured.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/celeb-hack-featured.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/\",\"name\":\"Mystery Surrounds \\\"iCloud Hack\\\" as Naked Celebrity Photos Leak - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#primaryimage\"},\"datePublished\":\"2014-09-02T15:17:26+00:00\",\"dateModified\":\"2014-09-02T22:37:59+00:00\",\"description\":\"As nude photos of Jennifer Lawrence and other female celebrities pop up on the net, learn more about how you can make your iCloud account harder to hack.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mystery Surrounds &#8220;iCloud Hack&#8221; as Naked Celebrity Photos Leak\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Mystery Surrounds &#8220;iCloud Hack&#8221; as Naked Celebrity Photos Leak\",\"datePublished\":\"2014-09-02T15:17:26+00:00\",\"dateModified\":\"2014-09-02T22:37:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#webpage\"},\"wordCount\":1124,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/celeb-hack-featured.jpeg\",\"keywords\":[\"Apple\",\"Ariana Grande\",\"Celebrities\",\"Celebrity Hack\",\"Celebrity Photos\",\"Find My\",\"Hacked\",\"Hackers\",\"iCloud\",\"iCloud Hack\",\"Jennifer Lawrence\",\"Kate Upton\",\"Photos\"],\"articleSection\":[\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"As nude photos of Jennifer Lawrence and other female celebrities pop up on the net, learn more about how you can make your iCloud account harder to hack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/","og_locale":"en_US","og_type":"article","og_title":"Mystery Surrounds \"iCloud Hack\" as Naked Celebrity Photos Leak - The Mac Security Blog","og_description":"As nude photos of Jennifer Lawrence and other female celebrities pop up on the net, learn more about how you can make your iCloud account harder to hack.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-09-02T15:17:26+00:00","article_modified_time":"2014-09-02T22:37:59+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/celeb-hack-featured.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/celeb-hack-featured.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/celeb-hack-featured.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/","name":"Mystery Surrounds \"iCloud Hack\" as Naked Celebrity Photos Leak - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#primaryimage"},"datePublished":"2014-09-02T15:17:26+00:00","dateModified":"2014-09-02T22:37:59+00:00","description":"As nude photos of Jennifer Lawrence and other female celebrities pop up on the net, learn more about how you can make your iCloud account harder to hack.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Mystery Surrounds &#8220;iCloud Hack&#8221; as Naked Celebrity Photos Leak"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Mystery Surrounds &#8220;iCloud Hack&#8221; as Naked Celebrity Photos Leak","datePublished":"2014-09-02T15:17:26+00:00","dateModified":"2014-09-02T22:37:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#webpage"},"wordCount":1124,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/celeb-hack-featured.jpeg","keywords":["Apple","Ariana Grande","Celebrities","Celebrity Hack","Celebrity Photos","Find My","Hacked","Hackers","iCloud","iCloud Hack","Jennifer Lawrence","Kate Upton","Photos"],"articleSection":["Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/celeb-hack-featured.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-89e","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/31324"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=31324"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/31324\/revisions"}],"predecessor-version":[{"id":31450,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/31324\/revisions\/31450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/31330"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=31324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=31324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=31324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}