1. JeffDenver's Avatar
    This is a great example of why a closed system is a bad thing.

    How the iCloud "Hack" Holds iOS Devices Hostage

    At least with an open system you would have work arounds. In a closed system there are no options...you just have to hope the vendor know what they're doing and can fix it.
    05-29-2014 03:07 PM
  2. pappy53's Avatar
    This is a great example of why a closed system is a bad thing.

    How the iCloud "Hack" Holds iOS Devices Hostage

    At least with an open system you would have work arounds. In a closed system there are no options...you just have to hope the vendor know what they're doing and can fix it.
    An easy way to avoid this is to have a passcode on the iPhone to unlock it. Then this can't happen.
    05-29-2014 03:22 PM
  3. sting7k's Avatar
    All you have to do in this instance is regain control of your iCloud account and then unlock your iPhone. The real issue is how are people getting into iCloud accounts, not iPhones being taken over. As the story lays out there could be many avenues through which this is occurring.
    05-29-2014 04:52 PM
  4. Alik Malix's Avatar
    This is a great example of why a closed system is a bad thing.

    How the iCloud "Hack" Holds iOS Devices Hostage

    At least with an open system you would have work arounds. In a closed system there are no options...you just have to hope the vendor know what they're doing and can fix it.
    Ok, so you android manager has initiated a lost phone feature (if there is one) that you did not request. In an "open system" what do you do?

    This happened in geographically secluded area, and best explanation I've seen so far - the hackers got hold of the iCloud passwords thru phishing, most likely thru another website - this can and happens for all kinds of security breaches: online banks, emails, and other accounts. Lock out system worked as it was supposed to - initiated by someone who had the iCloud password, in this case somewhere the user screwed up.

    I would worry about which ONE of the 15 BBM apps in the Google Play store is really BBM for example, remember that one?
    06-01-2014 01:39 AM
  5. RavenSword's Avatar
    So, what's interesting is this seems like a prank because the email they gave to the people to send money to doesn't even have a paypal account attached to it. So this just seems like high level trolling to me.

    Also, they go their passwords because people are dumb and use the same password for everything and they phished it.
    06-01-2014 02:12 AM

Similar Threads

  1. Replies: 2
    Last Post: 04-28-2015, 08:07 AM
  2. My email accounts have been hacked two times
    By sickle2 in forum Android Security Talk
    Replies: 17
    Last Post: 06-12-2014, 09:35 PM
  3. Replies: 83
    Last Post: 06-05-2014, 03:30 AM
  4. ISIS Wallet hacked.
    By troshs in forum AT&T
    Replies: 2
    Last Post: 06-03-2014, 12:28 PM
  5. Sony Z2 headset tap hack
    By ShadowLawlless in forum Sony Xperia Z2
    Replies: 1
    Last Post: 05-19-2014, 02:42 PM
LINK TO POST COPIED TO CLIPBOARD