Type to search

Unbelievable Photos Leaked from the Seven Worst Celebrity Phone Hacks

Advertisement

The alleged hack of multiple celebrities’ iCloud accounts by Apple is the topic of this week’s rumors. Numerous naked images reportedly taken by more than 100 actors and singers have been made public online.
Ariana Grande, Victoria Justice, Jennifer Lawrence, Kate Upton, Rihanna, Kim Kardashian, Kirsten Dunst, and Selena Gomez were among the 101 celebrities whose photos appeared on the online image-sharing forum. According to rumors, the photos were taken from the celebrities’ iCloud accounts.

cyber security technology orange circuit background hacker computer cloud alert virus spider keyhole vector illustration

Advertisement

How Did This Happen?

The anonymous individual who initially published the pictures of the celebrities asserted to have additional images and explicit films of Lawrence and he/she then requested money via PayPal and Bitcoin in exchange for posting them.

Concerns have been expressed regarding the level of security provided by internet services like cloud storage in the wake of the occurrence. Apple users may automatically save their data online, including images, documents, and emails, thanks to the iCloud service. 

Once they have registered with the service, users can view their documents from any location. It’s likely that the attackers gained access to the celebrity’s iCloud account first by “chaining” between accounts, then used that access to obtain the victim’s contact book to gather information for additional attacks.

Additionally, it’s improbable that the entire Apple iCloud service and its infrastructure have been infiltrated by hackers. Most likely, the claimed attacker used a hack to target specific accounts.

 

1. Scarlett Johansson

A couple of the actress Scarlett Johansson’s nude images from 2011, which she said were for her ex-husband Ryan Reynolds, were posted online. Investigators soon identified Chris Chaney, a 35-year-old hacker from Jacksonville, Florida, as the source of the leak. Chaney was sentenced to 10 years in jail for breaking the law by breaking into the email accounts of over 50 people working in the entertainment sector.


Advertisement

2. Leslie Jones

Leslie Jones, a Saturday Night Live cast member and actress had her personal website hacked in August 2016, which led to the loss and public release of her passport, driver’s license, and a few nude images. Following the debut of the Ghostbusters reboot a month prior, Jones had been targeted by racist online trolls, particularly on Twitter.

Jones temporarily stopped using social media because the abuse was so unbearable. As a result, Twitter permanently banned provocateur Milo Yiannopoulos, whose supporters had been particularly vicious in their harassment of Jones on Twitter.


3. Paris Hilton

The hackers took control of Hilton’s phone and T-Mobile account by locking her out and gaining access to all of her texts, videos, and images, some of which included several of her nudes.

Advertisement

4. Miley Cyrus

Josh Holly, a young hacker who conned a MySpace employee into giving him access to a list of account passwords, got into Miley Cyrus’ MySpace and Google accounts. Holly discovered that Cyrus’ MySpace password also functioned for her Gmail account, where he discovered sexual images that she had sent to Nick Jonas.


5. Sarah Palin

When a 20-year-old man discovered that Sarah Palin had made her own birth date the solution to a password-reset question, he broke into Palin’s Yahoo account in September 2008, when she was the governor of Alaska at the time and a vice presidential candidate. 

The intruder, who eventually served time in prison, uploaded screenshots of Palin’s emails to WikiLeaks. Palin’s family photos and proof that she might have used her personal email account for work-related purposes.

Advertisement

6. Carla Bruni

At the expense of Carla Bruni, the former first lady of France and an actress and singer, the mere offer of celebrity nude images turned into a highly valuable tool for foreign espionage. Chinese spies enticed senior international leaders with the subject line, “French First Lady naked images!” during a Group of 20 economic meeting in Paris in 2011. Due to this, almost all recipients were forced to open an attachment that, maybe to some recipients’ surprise, contained malware rather than pornographic images.


7. Pippa Middleton

Despite not being a member of the British royal family, Pippa Middleton, the Duchess of Cambridge’s sister, has experienced problems with hackers. This year, shortly after Middleton’s iCloud account was compromised, and more than 3,000 personal images were taken, an arrest was made. The Sun and Daily Mail newspapers in Britain both said that a vendor had gotten in touch with them under an anonymous name and offered to sell the pictures for at least $70,000.

Advertisement

8. What Does Cybersecurity Do?

Essentially, the term “cyber security” refers to a group of techniques, tools, and procedures that work together to protect computer systems, networks, and data against hacker attacks and illegal access. Protecting all organizational assets against external and internal threats, as well as disruptions brought on by natural disasters is the primary goal of cyber security.

A successful and efficient cyber security posture necessitates coordinated efforts across all of the organization’s information systems because organizational assets are comprised of numerous diverse systems.

Advertisement

How to Protect Your Phone

  1. When it comes to preventing basic hacking attempts, following the basics is a fantastic place to start for casual phone users:
  2. Never leave your phone unattended – The first and best tip to follow when in a public area is to always keep your phone on you.
  3. Change the default passcode on your phone – The default password on your phone is probably straightforward and predictable, and those who know it can take advantage of it.
  4. Avoid using the standard “1234,” “0000,” and “2580” codes and instead, use something more complex.
  5. Manage your Bluetooth Security. Avoid using unprotected Bluetooth networks, and turn off your Bluetooth service when you aren’t using it.

 

We hope this article has provided you with enough reason to make sure you aren’t a victim of cybercrime.

 

 

Advertisement

You Might also Like