- Apple Inc iCloud hacked, Jennifer Lawrence, others nude photos leaked; inquiries startiPhone can be hacked; ask Jennifer Lawrence after nude photo leaked onlineApple iCloud nude photo leaks: FBI inquiries in Jennifer Lawrence, other case startsAfter nude celebrity photos leak, Apple Inc washes hands off Jennifer Lawrence hacking
Apple Inc has often displayed uncanny timing, with its well-orchestrated end-of-year iPhone releases. But the leak of racy celebrity photos in the past few days put the company in the unusual position of having to mend its image just days before a highly anticipated September 9 product launch.
Nude photos of Hollywood celebrities, including Oscar-winning actress Jennifer Lawrence, posted on Internet forums by unknown hackers has sparked condemnation from stars and their publicists, and prompted an investigation by the Federal Bureau of Investigation.
In the wake of the breach, cybersecurity experts and mobile developers have called out inadequacies in Apple's and, more generally, cloud-services security. Thousands have taken to Twitter to express their frustrations with the company.
Some security experts faulted Apple for failing to make its devices and software easier to secure through two-factor authentication, which requires a separate verification code after users log in initially. The process requires several steps and more than rudimentary knowledge of a phone's workings.
Apple could also do more to advertise that option, they said. Most people do not bother with security measures because of the extra hassle, experts say, and the leading phone makers are partly to blame.
Nude photos of Hollywood celebrities, including Oscar-winning actress Jennifer Lawrence, have been posted on Internet forums by unknown hackers
"Making things more private or secure by default instead of having "security options" would go a long way. Most people won't take those options and they aren't necessarily advertised as available," said Matt Johansen, senior manager of the Threat Research Center at WhiteHat Security Inc.
"Most sites with two-factor authentication, you need to go to some very obscure options menu, multiple-clicks deep."
To be sure, the inadequacies identified in Apple's cloud and mobile security ring true of other cloud or Internet-storage services, experts said. Official and celebrity Twitter accounts for instance had been routinely hacked.
Apple said on Tuesday the hacks were the result of targeted attacks on accounts and not a direct breach of its systems. The company referred to such attempts as "all too common on the Internet."
But the highly public affair remains potentially one of Apple's worst public crises in years. Speculation continues to spread on blogs about flaws in the iCloud service, which lets computer and mobile users store photos, documents and other data so they can be accessed from a plethora of devices they own.