![]() And for as long as they've existed, people have been breaking them. And to delay me from getting it back, they used my Apple account to wipe every one of my devices, my iPhone and iPad and MacBook, deleting all my messages and documents and every picture I'd ever taken of my 18-month-old daughter. They really just wanted my Twitter handle: As a three-letter username, it's considered prestigious. My Apple, Twitter, and Gmail passwords were all robust-seven, 10, and 19 characters, respectively, all alphanumeric, some with symbols thrown in as well-but the three accounts were linked, so once the hackers had conned their way into one, they had them all. This summer, hackers destroyed my entire digital life in the span of an hour. All a hacker has to do is use personal information that's publicly available on one service to gain entry into another. Thanks to an explosion of personal information being stored in the cloud, tricking customer service agents into resetting passwords has never been easier. The way we daisy-chain accounts, with our email address doubling as a universal username, creates a single point of failure that can be exploited with devastating results. ![]() Leaks and dumps-hackers breaking into computer systems and releasing lists of usernames and passwords on the open web-are now regular occurrences. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |