Preview

Epic Hacking Research Paper

Better Essays
Open Document
Open Document
3326 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Epic Hacking Research Paper
How Apple and Amazon Security Flaws Led to The Epic Hacking of Mat Honan

Meet Mat Honan. He just had his digital life dissolved by hackers. On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.
Had he been regularly backing up the data on his MacBook, he wouldn’t have had to worry about losing more than a year’s worth of photos, covering the entire lifespan of his daughter, or documents
…show more content…
i just liked your username like I said before” he told Mat via Twitter Direct Message.
After coming across Mat’s account, the hackers did some background research. His Twitter account linked to his personal website, where they found his Gmail address. Guessing that this was also the e-mail address he used for Twitter, Phobia went to Google’s account recovery page. He didn’t even have to actually attempt a recovery. This was just a recon mission.
Because Mat didn’t have Google’s two-factor authentication turned on, when Phobia entered his Gmail address, he could view the alternate e-mail Mat had set up for account recovery. Google partially obscures that information, starring out many characters, but there were enough characters available, m••••n@me.com. Jackpot.
This was how the hack progressed. If Mat had some other account aside from an Apple e-mail address, or had used two-factor authentication for Gmail, everything would have stopped here. But using that Apple-run me.com e-mail account as a backup meant he told the hacker he had an AppleID account, which meant he was vulnerable to being

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this scenario, the fitness club was hacked from an unknown source. The fitness club has contracted Malcom Testing Solutions to do penetration tests and find any vulnerabilities along with make some security changes to prevent this issue from happening again. The security policies need to be changed as far as account management.…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    AFM 351 Satyam Fraud

    • 815 Words
    • 4 Pages

    These “super-user” login identifications masked the existence of the fake invoices from the leaders of…

    • 815 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    name and password, but also trolled through network activity to obtain potential accounts (username and…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    The article was considerably valid as was demonstrated by credible news programs and other articles. The importance of keeping patches and antivirus signatures up to date, to help prevent these types of attacks was discussed in detail. Users selecting strong passwords was also discussed, and revealed as a key component in the ability to compromise these accounts. This article was valuable and affected a lot of people. It is clear that there are prevention methods that can be used, to secure your…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The breach happened to be a very experienced gentleman that hacked into the servers of T-Mobile to access some U.S confidential emails and files, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities.…

    • 241 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Eng221 Team Final

    • 375 Words
    • 2 Pages

    If at anytime you forget your username and password it can be retrieved/reset (figure 1.3). The user has option of using a link sent by email or answering security questions. The process is as follows:…

    • 375 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Choicepoint Attack

    • 401 Words
    • 2 Pages

    • sensitive data should never be removed from a secured worksite without taking precautions such as encrypting files or shredding documents;…

    • 401 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1984 vs 1983

    • 2142 Words
    • 6 Pages

    Technology is a wonderful thing, but in the words of Spider-Man's Uncle Ben, "With great power, comes great responsibility." If we are not careful, the technology we know and love could be used against us, even subtly. In reality the technology of today better resembles dystopian visions represented by George Orwell’s ‘1984’ following Winston Smith’s fight against the totalitarian state rule of England, Steven Spielberg’s film “Minority Report”, set in a dystopic future where pre-crime bears the authorisation to arrest ‘criminals’ based on the simple predictions of ‘Pre-Cogs’ and Phillip K Dick’s novella “Minority report” based on the paradoxes raised by predicting future. The three texts represent the dystopia we face as we become a more connected society. With social networks, cloud computing and even more specific, less-thought-about tech such as Internet-connected home surveillance systems, we will find ourselves in a delicate balance of trust and paranoia.…

    • 2142 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Timothy McVeigh

    • 708 Words
    • 3 Pages

    Timothy was the only son out of 3 siblings (middle child). His parents divorced when Timothy was 10 years old. Raised by his father in Pendleton, NY; Timothy was bullied as a child throughout his elementary school days. He believed that the U.S government was the ultimate bully. Some saw Timothy as very shy and withdrawn, whereas others saw him as outgoing and playful. Throughout his childhood he only managed to have one girlfriend; he stated, “I don’t know how to impress girls.”…

    • 708 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “Whoever hacked into our system is bright. They didn’t leave many traces. I don’t think it was a student. This is some pretty sophisticated hacking. The police are getting closer to the hacker, though. He or she left a few bread crumbs for us to follow. Ed Robles (district technology…

    • 732 Words
    • 3 Pages
    Good Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    Case Study

    • 1275 Words
    • 4 Pages

    The case “Hacking into Harvard” involves the applicants of some of the nation’s most prestigious MBA programs, who thought they had a chance to find out sooner what admission decisions the business schools made in their case. On Businessweek Online message board they saw instructions left by an anonymous hacker on how to get into schools databases and find out the decisions made. It was not hard – all schools used the same application software from Apply Yourself, Inc., and the instructions posted were very clear and simple.…

    • 1275 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Hacking Into Harvard

    • 589 Words
    • 3 Pages

    Reasons that may have caused the applicants to hack into the system to acquire their results could be because they were too impatient to wait for the official announcement that is weeks away. So out of curiosity, they clicked the link that the original anonymous hacker provided on some websites. The…

    • 589 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Take a trip down memory lane with these top cyber films. Designed for computer buffs, these movies range from spy thrillers to cyber crime movies. They were selected based on their excellent plot lines and portrayals of technology. Unlike typical movies, these films use computers the way they are actually used in real life with a few exceptions.…

    • 598 Words
    • 3 Pages
    Good Essays