Hackers know how to punch holes in your cloud
August 21, 2012Grazed from The Lowell Sun. Author: Norm Morin.
Password security is a big issue with cloud computing.
Mat Honan, "Gadget Lab" columnist for Wired magazine, found out the hard way that cloud computing has some issues that should be considered before you put trust in the cloud. If you would like to read Mat’s detailed account of the situation, check out http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/
Mat had been depending upon the cloud to preserve and manage his data. Everything was fine until hackers decided to play with his digital presence. If Mat was only digital, he would have been completely erased…
One evening Mat was enjoying quality time with his family when his iPhone powered down. He assumed his battery required charging. But when he attempted to gain access to his iPhone, he was blocked by a PIN request. Mat didn’t use a PIN on his iPhone. What was going on?
Something bad was happening. A hacker had gained access to Mat’s personal information, which was distributed in various places on the cloud. First, the hacker gained access to Mat’s Amazon account. Then, the hacker was able to use information mined from Amazon to break into other Internet-based accounts.
It was almost like dominoes. One account after another was compromised. Information was erased. Apple has an interesting feature that renders iPhones and other idevices useless. The hacker was able to convince Apple to
Advertisement
execute a device reset. Everything was erased on the iPhone that was in his pocket. Can you imagine that? Your iPhone is safely in your pocket but it is erased without your knowledge.
Erasing information from a computer remotely can be a useful feature if the device is stolen, but that same feature could cause havoc in the wrong hands. It seems like a good idea — erase the computer or smartphone if it is stolen. Could a hacker cause the legitimate owner to lose their information? There isn’t much that you could do even if you knew what was happening.
Who knows why Mat was targeted? Was he chosen or did he just happen to be in the wrong place at the wrong time? Don’t think that it couldn’t happen to you. Mat was not the average computer user. He was more sophisticated, but hackers were able to erase information.
You might reconsider your position if you depend on the cloud to secure and back up your data. The cloud is not the perfect solution to data safety. Blindly depending on the cloud to preserve your data is not a good idea. Don’t forget, "If you want something done, do it yourself." Perhaps this is a good approach to managing computer data.