When activated, the service automatically stores users' photos, emails, documents and other information in a 'cloud', allowing them to sync the data across a range of platforms. Earlier today, The Next Web spotted code on software development site Github, that would have allowed malicious users to use ‘brute force’ to gain an account’s password on Apple i Cloud, and in particular its Find my i Phone service.Owen Williams from The Next Web, who discovered the bug, said: 'The Python script found on Git Hub appears to have allowed a malicious user to repeatedly guess passwords on Apple's "Find my i Phone" service without alerting the user or locking out the attacker.'Given enough patience and the apparent hole being open long enough, the attacker could use password dictionaries to guess common passwords rapidly.According to TMZ, Woods and American Idol alum Mc Phee, 33, have already hired lawyers to pursue legal action against the website that posted the images.This isn’t the first time celebrities have been victims of illegal hacks.Brute force, also known as brute force cracking, is a trial-and-error method used by to get plain-text passwords from encrypted data When activated, it automatically stores users' photos, emails, documents and other information in a 'cloud', allowing them to sync the data across a range of platforms. Users can then access their information from any internet-connected device using a log-in and password.The service secures data by encrypting it when it is sent over the web, storing it in an encrypted format when kept on server, and using secure tokens for authentication.Kirsten Dunst has become the first celebrity to publicly criticize Apple after it emerged that a flaw in the 'Find My i Phone' function of its i Cloud service may have helped an unknown hacker steal nude photos of her and '100 other celebrities'.
You want high quality images and movies showing women enjoying sexual climax, right?
Many users use simple passwords that are the same across services so it's entirely possible to guess passwords using a tool like this.'If the attacker was successful and gets a match by guessing passwords against Find my i Phone, they would be able to, in theory, use this to log into i Cloud and sync the i Cloud Photo Stream with another Mac or i Phone in a few minutes, again, without the attacked user's knowledge.
Rob Cotton, CEO at web security experts NCC Group added: 'Cyber security is not just a technology problem, humans are very much key to its success.
“It is an outrageous and despicable invasion of privacy for anyone to steal and illegally publish private intimate photos,” a rep for the Olympic skier, 32, says in a statement to Us Weekly.
“Lindsey will take all necessary and appropriate legal action to protect and enforce her rights and interests,” the statement continues.