Welcome to the Android Central Forums Create Your Account or Ask a Question Answers in 5 minutes - no registration required!
Results 1 to 5 of 5
  1. Thread Author  Thread Author    #1  
    JeffDenver's Avatar
    Banned

    Posts
    2,925 Posts
    Global Posts
    2,945 Global Posts
    ROM
    Perma-rooted and unlocked

    Default iCloud hack hold's iDevices hostage

    This is a great example of why a closed system is a bad thing.

    How the iCloud "Hack" Holds iOS Devices Hostage

    At least with an open system you would have work arounds. In a closed system there are no options...you just have to hope the vendor know what they're doing and can fix it.
  2. #2  
    pappy53's Avatar
    Banned

    Posts
    1,533 Posts
    Global Posts
    2,323 Global Posts
    ROM
    Stock

    Default Re: iCloud hack hold's iDevices hostage

    Quote Originally Posted by JeffDenver View Post
    This is a great example of why a closed system is a bad thing.

    How the iCloud "Hack" Holds iOS Devices Hostage

    At least with an open system you would have work arounds. In a closed system there are no options...you just have to hope the vendor know what they're doing and can fix it.
    An easy way to avoid this is to have a passcode on the iPhone to unlock it. Then this can't happen.
  3. #3  
    sting7k's Avatar

    Posts
    562 Posts
    Global Posts
    3,619 Global Posts
    ROM
    Stock JB 4.2

    Default Re: iCloud hack hold's iDevices hostage

    All you have to do in this instance is regain control of your iCloud account and then unlock your iPhone. The real issue is how are people getting into iCloud accounts, not iPhones being taken over. As the story lays out there could be many avenues through which this is occurring.
  4. #4  

    Default Re: iCloud hack hold's iDevices hostage

    Quote Originally Posted by JeffDenver View Post
    This is a great example of why a closed system is a bad thing.

    How the iCloud "Hack" Holds iOS Devices Hostage

    At least with an open system you would have work arounds. In a closed system there are no options...you just have to hope the vendor know what they're doing and can fix it.
    Ok, so you android manager has initiated a lost phone feature (if there is one) that you did not request. In an "open system" what do you do?

    This happened in geographically secluded area, and best explanation I've seen so far - the hackers got hold of the iCloud passwords thru phishing, most likely thru another website - this can and happens for all kinds of security breaches: online banks, emails, and other accounts. Lock out system worked as it was supposed to - initiated by someone who had the iCloud password, in this case somewhere the user screwed up.

    I would worry about which ONE of the 15 BBM apps in the Google Play store is really BBM for example, remember that one?
  5. #5  

    Default Re: iCloud hack hold's iDevices hostage

    So, what's interesting is this seems like a prank because the email they gave to the people to send money to doesn't even have a paypal account attached to it. So this just seems like high level trolling to me.

    Also, they go their passwords because people are dumb and use the same password for everything and they phished it.

Similar Threads

  1. My email accounts have been hacked two times
    By sickle2 in forum Android Security Talk
    Replies: 17
    Last Post: 06-12-2014, 10:35 PM
  2. Replies: 83
    Last Post: 06-05-2014, 04:30 AM
  3. ISIS Wallet hacked.
    By troshs in forum AT&T
    Replies: 2
    Last Post: 06-03-2014, 01:28 PM
  4. Sony Z2 headset tap hack
    By ShadowLawlless in forum Sony Xperia Z2
    Replies: 1
    Last Post: 05-19-2014, 03:42 PM
  5. Replies: 0
    Last Post: 05-16-2014, 07:10 PM

Posting Permissions