What Recent iCloud Celebrity Leaks Taught Us: Data Theft Understood And Prevented

iCloud Celebrity LeaksWith the massive celeb nude photos leak currently in the limelight, people across the globe are becoming paranoid about their data safety. Unless you are desperately exhibitionistic and highly enthusiastic about showcasing your unmentionables to a worldwide society, using some popular applications doesn’t look very attractive these days. Obviously, your spicy photos and intimate chats are not as valuable as Jennifer Lawrence’s, but the whole idea of being so vulnerable when it comes to your online security really makes people nervous. Firstly, this article will give you even more reasons to panic, but later we will share some tips for protecting yourself from undesired invasions and data theft.

Part 1:  Big Brother

Smartphone: friend or foe?
Let’s be honest: we can’t go an hour without our smartphones; most people can’t imagine their lives without Apple and Android devices in their pockets. But by accepting these tools’ help, you also allow them to track you on each level. Potentially, corporations can get the information about your circle of contacts, habits and routes, or even record your phone calls and read your messages. Obviously, they don’t do that while you’re being a good boy/girl, but once you become interesting for them in one way or another, they won’t hesitate to use this information.

Google knows almost everything
It’s no longer a secret that Google gathers information about your web search. The sad thing is they don’t delete it, and your 5 year old query about making a H-bomb in your garage is probably still there, although it’s been a long time since your browser history and cache have been erased from your computer. Conspiracy theory fans claim that folks in Google just wait until you cross the line to use this information against you. In fact, the consequences may never happen, but the truth remains: you’re being watched by the search engine you blindly trusted. The Incognito mode in your browser doesn’t protect your data either: the history isn’t displayed in your History tab, but websites you visit may still have records of your visit. Technically, Google has access to your Facebook, Twitter and LinkedIn accounts, knows your health issues, your political and sexual preferences, your routes in Google Maps, your email subscriptions, and your browser search history.

Facebook never forgets friends
Obviously, Facebook is not the place for storing discreditable photos, and most people don’t use it for that (unless you are 12 and brain dead). However, most folks feel uncomfortable looking at middle school photos in their 20s. Some users just decide to quit their social networking life once and for all and delete accounts. However, Facebook keeps storing your images and other information long after they’ve been deleted, and in the case someone has a direct link to them, it would be possible to view this content years after the official deletion.

Smart TV: and you, Brutus?
Typically, people expect to discover spies in their computers and never even think about a family’s fave being guilty as well. The point is your SmartTV is connected to the Internet, which means it can collect your data, too. The “Collection of watching info” option is on by default, but even disabling this feature doesn’t stop your TV from gathering the information about your watching preferences.

We can have endless discussions about corporations that turn the word “privacy” into a myth, such as Visa, Apple, Microsoft, mobile and Internet providers, NSA, FBI, etc. After all, this data helps them control the taxes, catch criminals, take care of migration, monitor the global marketplace and improve their products and services. But is it possible to protect this data from cyber criminals who use your intimate photos for blackmail’s sake or money theft?

Part 2: Online Safety

As an average user grows smarter, an average hacker grows trickier. Most people won’t click on the weird links or open popups of an unknown origin in 2014, so hackers have to invent alternative ways of stealing your data.
With that in mind, conscious users will probably grow extra cautious about their online activities and data protection. Although in most cases the answer can only look like “Deal with it”, there are some ways to double your protective measures and allow you to sleep at night.

1) Avoid Phishing
Avoid links sent to you via email, SMS or social networks by people you don’t know. Even if a link was sent by your friend, double check it’s actually from your friend: in some cases, such links can come from the hacked accounts that belong to people you know. Make sure you never enter your email, iCloud, credit card or SSN passwords on any site forms, even if the site’s interface looks familiar and trustworthy. Sometimes, if you want to access a site, it’s better to just type its name in the address line.

2) Antiviral tools
Don’t forget the basics! Good old antivirus will protect your personal data from spyware that can potentially steal your information. If your computer or mobile device is infected with some virus, it will be harder to prevent hackers’ attacks, too. Don’t hesitate to pay for a powerful antivirus because free ones typically don’t provide a decent security level.

3) Encryption software
If you work with important documents, forget about storing your passwords in files. Invest in decent software to create encrypted disks on your hard drive. Passwords will be comparatively safe, and you can minimize the risks of data leaks. For example, try BitLocker or paid programs by Symantec (PGP).

4) Password software
To protect your passwords, accounts and credit cards and make them hard to hack, we recommend using top-notch password management software like 1password by AgileBits. It can work on both your smartphone and tablet and is compatible with all browsers.

5) Always use unique passwords
Yes, “unique” is the keyword in this sentence. Even if you use an ancient Sumerian magic spell as your password, your chances to be hacked grow if you use the same password for multiple accounts. Thus, aside from the fact that a good password should be strong (i.e. contain letters in upper/lowercase, numbers, and symbols and exclude your user name), it should also be unique and only used for a single account.

Cyber space, pretty much like real life, can’t be 100% safe even if you take protective measures. But staying safe in a house that has a panic button, cameras, a big dog and a safe with ammo is much safer than walking completely drunk and relaxed through Brazilian favelas wearing a gold Rolex. The choice is yours!

One thought on “What Recent iCloud Celebrity Leaks Taught Us: Data Theft Understood And Prevented

  1. Pingback: Did Washington Post Cross The Line Over Leaked Nudes

Leave a Reply

Your email address will not be published. Required fields are marked *