Netimperative
Netimperative
  • Home
  • Ads
  • Content
  • Mobile
  • E-commerce
  • Social
  • Regulation
  • Video
  • Viral
Menu
  • Apple
  • Amazon
  • Facebook
  • Google
  • twitter
  • WhatsApp
  • YouTube

Mass iCloud hack: Flood of saucy celebrity selfies leaked online

September 2, 2014

Hackers have leaked nude photos from a number of high profile celebrities, sparking fears over the security of Apple’s iCloud system.


icloud.jpg
The images first appeared on online bulletin board 4chan before going viral, according to US media reports.
More than 60 photographs of Lawrence were among those reportedly stolen after what some have said could have been an iCloud leak which allowed celebrities’ phones to be hacked.
A list of those who have allegedly been hacked has also appeared online, Buzzfeed reported.
Containing more than 100 names, it includes Jennifer Lawrence, Aubrey Plaza, Cat Deeley, Kelly Brook, Kim Kardashian, Michelle Keegan, and Rihanna.
A number of the stars on the list have trended on Twitter after the photos were shared online.
Apple has yet to comment about claims that the person who stole the images obtained them by hacking into iCloud, the remote storage service.
It’s unclear how the images were obtained, but anonymous 4chan users said that they were taken from celebrities’ iCloud accounts.
The accounts are designed to allow iPhone, iPad, and Mac users to synchronize images, settings, calendar information, and other data between devices, but the service has been criticized for being unreliable and confusing.
The huge leak was teased earlier this week when an anonymous user suggested that they had access to a cache of celebrities’ personal photos.
The user that claimed responsibility for the hack indicated that more pictures and videos of the celebrities were available, but requested both Bitcoin and monetary donations to a PayPal account before the stolen images and videos were posted.
Many of the images are reportedly forgeries: a spokesperson for Ariana Grande said that the photos are “completely fake,” while Victoria Justice took to Twitter to refute claims that the pictures were of her.
But other celebrity victims of the hack have confirmed that the pictures are real. Mary Elizabeth Winstead tweeted that she could “only imagine the creepy effort that went into”the breach, and a spokesperson for Jennifer Lawrence released a statement to BuzzFeed in which they called the leak “a flagrant violation of privacy.”
Winstead claims that the photos shouldn’t have even existed – having already been deleted from her phone.

Knowing those photos were deleted long ago, I can only imagine the creepy effort that went into this. Feeling for everyone who got hacked.

— Mary E. Winstead (@M_E_Winstead) August 31, 2014


A number of Twitter accounts posting uncensored pictures of the victims of the hack have already been suspended.
Harsher punishments could await the person responsible for leaking the pictures — in 2012, a man was sentenced to 10 years in prison for hacking the private email accounts of celebrities including Mila Kunis and Scarlett Johansson.
Analysis: Apple iCloud Hack – How one breach can snowball
Gavin Davey, Associate in the Insurance Industry Group at international accountancy firm Moore Stephens, commented on the mass hack of Apple’s iCloud: “Users need to ask themselves just how private their data really is and take proper responsibility over their security. Criminals and hackers rely on the fact that the more secure an account is the more complicated it is for the user to access it which breeds complacency. Passwords are often shared across multiple websites and cloud systems so a breach at one can easily snowball into multiple breaches across all of users’ systems, and storage.
“The security of each individual device also needs to be assessed. Apple devices, despite being generally regarded as very user-friendly, have a bewildering array of security options many confused users ignore, leaving them vulnerable to attack. It’s no surprise that criminals and hackers are able to employ myriad attack vectors in order to gain access to private information.”

Uncategorized Apple, email, images, iPad, media

Archives

Tags

advertising agencies Amazon analytics Android Apple apps Australia BBC brands Brazil broadband China Christmas comScore content digital marketing ecommerce email Entertainment Europe Facebook France games Germany global Google government images infographic local marketing media Microsoft music Privacy retail Search security smartphones technology Twitter UK video YouTube

Recent Posts

  • Top six Valentine’s Day ads for 2022
  • 2021 Halloween: digital marketing campaigns we loved this year
  • Empowering employees; the critical link between EX and CX
  • Investing in in-app social features is a must in a world that is crying out to be connected
  • QR codes, Gen Z and the future of OOH

Copyright © 2025 Netimperative.

Magazine WordPress Theme by themehall.com

We use cookies to improve the website and your experience. We’ll assume you’re okay with this, but you’re welcome to opt-out
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT