In a world where the Internet is more and more familiar with us, the security is often less concerned. We tend to use the Internet without any awareness of the cybercrime. Once some situations happen, it is usually too late for us to protect our privacy.
Like Bruce Schneier once said that:
“Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in seconds; and be stolen without your knowledge.”
When we use the social media, we often provide our story as well as other privacy information to the public. These information we posted online can be accessed at any time even though we have limited the audience on the security setting. The hackers can use many techniques to trick the system allowing them to retrieve the privacy information from any where of the world. The whole process can be done without any acknowledgment. …show more content…
Most of the photos containing nudity were released to the anonymous Internet forum and quickly spread around over the social network after a few weeks. The hacker revealed that they had taken the advantage of security issue in the iCloud API, which allow them to perform brute-force guessing the password at unlimited attempts. Also, the phishing email was sent to the victims asking them to provide any information needed to gain access into an account. Figure 1 shows an example of the phishing mail that look like the official email from Apple but it link to the fraudulent website that collect the personal information of a