08/11/2018
Keep hackers out of your cloud
You increasingly hear about private images being stolen by hacking an iCloud or Google account. How do they do it, and how can you prevent it? You’ll read all about it in this blog article.
How do hackers operate?
Many hackers try to gain access to your cloud by searching online for previously leaked passwords and trying them out. If you’ve been using the same password for years across different websites, the hacker can easily access your iCloud or Google account. Once inside, the hacker can find stored photos and videos, as well as complete WhatsApp conversations. Passwords can also be uncovered through phishing emails. Another popular method to gain access is by answering security questions. Questions like ‘what is the name of your first pet’ can be answered by hackers simply by searching your social media account.How can you prevent your iCloud from being hacked?
Of course, stealing and distributing nude photos without consent is illegal, but it’s often difficult to catch and prosecute the hacker. Many victims don’t even realize that they’ve been hacked and that their private images are being circulated. The best approach is to prevent hackers from accessing your iCloud or Google account in the first place, but how can you do that?- Always use a strong password
First of all, it’s wise to use password generators to create a strong password. This reduces the chance that your passwords can be guessed. Also, don’t use the same password for multiple services to prevent someone from gaining access to several accounts at once. - Beware of phishing emails
Do you receive an email asking for your password? Apple, Google, and other companies will never ask for your password like this. If you are directed to a page, check if it is encrypted and whether the page is legitimate. - Use two-factor authentication
Cloud accounts are usually secured with security questions, but it’s much smarter to switch to two-factor authentication. This requires an extra numerical code to log into your account. This code is sent to your trusted devices, making remote hacking impossible.