In the original 4chan thread where the hacker first posted the images, the consensus was that Apple's iCloud service was to blame. But how likely is it that Apple's encrypted cloud service led to the mass hack, and what are the other ways that the nude photos could have emerged? The original leaker behind the celebrity photos claimed that they accessed the images using the iCloud accounts of various celebrities. It's unlikely that someone has broken into Apple's iCloud service. Instead the photos most likely emerged due to a type of hacking known as "social engineering. Jennifer Lawrence is known to use iCloud after she let slip in a red carpet interview with MTV this year that she frequently has trouble with the service, remarking "My iCloud keeps telling me to back it up, and I'm like, I don't know how to back you up. Do it yourself.

Information

RELATED ARTICLES
Apple has dismissed claims an iCloud hack resulted in numerous private photographs of female celebrities being leaked online. In a statement to the press, released overnight, Apple denied the leaked photographs were in the public domain because iCloud was breached. On Monday, news emerged about the publication of hundreds of private pictures belonging to female celebrities, including Hunger Games star Jennifer Lawrence and Spiderman actress Kirsten Dunst, on the Reddit and 4Chan messageboards. The photos, it was claimed, were obtained by hackers who managed to infiltrate Apple's online backup service iCloud using a tool called iBrute. This allows hackers to repeatedly submit potential passwords to Apple's Find My iPhone service login page until they uncover the correct one. Once accessed, it is then possible for the hackers to access data stored in the iCloud account belonging to the breached Apple ID. Speaking to the Associated Press news agency, a spokesperson for the FBI said it is "aware of the allegations" and making moves to address them. A global view into the impact of digital transformation on risk and security management. Office makes it easy to lose valuable data regularly, unpredictably, unintentionally, and for good. The top ten password-cracking techniques used by hackers.
Celebrity Nude Photo Leaks
Kate Upton was one of the celebrities targeted by hackers. AP After private photographs of some of the most famous women in the world were posted online, journalists, PR representatives, and curious internet users scrambled to figure out how a nameless hacker had gained access to the cellphones of the rich and famous. When shocked internet users on underground forums tracked down the person believed to be behind the leak, his explanation was startlingly simple: iCloud. After hundreds of private photographs were posted online, many commenters struggled to believe that someone had gained access to Apple's online service. The tech giant's online storage and backup service is praised by the company for its simplicity, that it "just works. As leaked photographs continued to be posted online, theories emerged regarding their source. Some suggested that a "brute force" hack recently unveiled by Russian security researchers was to blame, while some internet commenters wondered whether venue Wi-Fi at the Emmy Awards had been compromised. But the truth is far more disturbing: The leaked celebrity photos don't originate from a single hack but instead from a collector who gradually added to his haul over months before suddenly deciding to post it online.
By Victoria Woollaston for MailOnline. On the anniversary of the iCloud leak, in which nude photos of celebrities such as Jennifer Lawrence leaked online, security experts reveal the case remains unsolved. On August 31 last year, hundreds of explicit images of some of Hollywood's most famous stars were posted to several forums anonymously after hackers broke into Apple iCloud accounts. The investigation has since led the FBI to search several addresses and seize electronic equipment but the case remains open and no charges have yet been brought. Scroll down for video. The investigation has since led the FBI to search addresses and seize equipment but the case remains open. Apple strenuously denied its servers had been breached as part of the attack, with many security experts pointing to password strength as being the root of the problem.