Featured Articles

Nvidia GTX 980 reviewed

Nvidia GTX 980 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Nvidia adjusts GTX 980 and GTX 970 pricing

Nvidia adjusts GTX 980 and GTX 970 pricing

It appears that Nvidia has been feeling the pulse of the market and took some note from comments regarding the original…

More...
iPhone 6 and 6 Plus reviews are up and they are good

iPhone 6 and 6 Plus reviews are up and they are good

Apple is dancing the same dance year after year. It releases the iPhone and two days before they start shipping it…

More...
Amazon announces three new tablets

Amazon announces three new tablets

Amazon has just released three new tablets starting with the $99 priced 6-inch Kindle Fire HD6. This is a 6-inch tablet…

More...
PowerColor TurboDuo R9 285 reviewed

PowerColor TurboDuo R9 285 reviewed

Today we will take a look at the PowerColor TurboDuo Radeon R9 285. The card is based on AMD’s new…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Thursday, 04 September 2014 10:44

Russians create iCloud hacking tools

Written by Nick Farrell

But Apple insist you are safe

Fruity cargo cult Apple is hoping that if it denies things long enough its low-tech and naive followers will start to believe that its iCloud is safe as houses.

However PC World has discovered that the iCloud is only about as safe as a Palestinian home on the West Bank as there is a thriving business in Russia for software which can knock over Apple’s cloud.

Anon-IB is full of offers for iCloud “ripping,” or downloading the entire contents of an account and their tool of choice is Moscow-based Elcomsoft’s Phone Password Breaker, or EPPB.

It is one of many and Elcomsoft CEO Vladimir Katalov said there are legitimate uses for his company’s software and he insists it does not exploit flaws in Apple services. We guess Apple just has a feature which allows you to steal pictures of naked celebs.

EPPB comes into play after a victim’s Apple ID and password have been compromised by other means. The software can pull text messages, attachments, call logs, address books, calendars, email account settings, photos and other information in a few minutes.

But it means that a hacker could set up a new device and restore it with the victim’s iCloud data. This is probably the software the hackers use after they have cracked the iCloud passwords. It is still not clear how the hackers have managed to do that. Guessing an Apple ID is tricky, but a password is still a brute force operation.

 

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments