Preview

Ipad's Security Breach

Better Essays
Open Document
Open Document
1539 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ipad's Security Breach
iPad’s Security Breach
Meredith Morrison
Strayer University
BUS 508 [ November 26, 2012 ]
Dr. Ronald Steffel

The Goatse Security firm’s possible objectives when they hacked into AT&T’s Website was to test for security. If they could hack into the system, so can any other hacker (iPad Security Breach, 2010). The Goatse Security firm wanted to confirm that if they could gather e-mail addresses, discovering vulnerability, so can people who are hackers. “We’ve reached out to the security group that first discovered the vulnerability, and have asked for a statement. We’re waiting to hear back,” said the FBI Investigating iPad breach in an update (The Wall Street Journal, 2010). AT&T was reaching out to iPad users, and was blaming the incident on computer hackers who were maliciously trying to speed up the process of “logging into its website (The Wall Street Journal, 2010). AT&T said that they take their customers privacy seriously, and does not want unauthorized users to be able to access company information. The Goatse Security firm uncovered the mistake, and then handed the result over to Gawker Media LLC. A member of the group with Gawker media LLC said it took AT&T to long to inform customers of the security breach (The Wall Street Journal, 2010). “If not for our firm talking about the exploit to third parties who subsequently notified them, they would never have fixed it,” the board member whos name is Escher Auernheimer said. “We know what we did was right” (The Wall Street Journal, 2010). The Goatse Security firm said that only the e-mail addresses of people were identified, and that no other information was a threat to them (The Wall Street Journal, 2010). The incident was blamed on malicious’ hackers, and AT&T warned users to be wary of revealing personal data. The attacks are known as “phishing,” and are disguised as being a trusted source (The Wall Street Journal, 2010). The FBI



References: Apple’s Worst Security Breach. (2010). Retrieved from http://gawker.com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed. AT&T Blames iPad Incident on ‘Malicious’ Hackers. (2010). Retrieved from http://online.wsj.com/article/SB10001424052748703389004575306/KEYWORDS=ipad AT&T Exposed iPad Customer’s Information. (2010). Retrieved from http://valleywag.gawker.com/5560295/steve-jobs-bragged-about-privacydays-ago. AT&T Fights Spreading iPad Fear. (2010). Retrieved from http://gawker.com/5559725/att-fights-spreading-ipad-fear. AT&T’s iPad Security Breach. (2010). Retrieved from http://online.wsj.com/video/digits-atts-ipad-security-breach/620A87F6-BADE-49BC-A3F3-887D44B25EA6.html? Einstein, A. (2010). FBI Investigating iPad Breach. (2010). Retrieved from http://gawker.com/5560542/fbi-investigating-ipad-breach. The Wall Street Journal. (2010).

You May Also Find These Documents Helpful

  • Powerful Essays

    Mis 535 Course Project

    • 3231 Words
    • 13 Pages

    AT&T is currently using what is called a 2Wire Gateway for services to customers, and there are many problems with this situation. The 2wire currently uses the 802.11g standard that is about ten years out of date, as well as the company was purchased by Pace. The company needs to upgrade the system that is used to provide wireless and wired Internet services to its customers, which means that with the upgraded service it…

    • 3231 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    intrusion was a result of spear phishing campaign, which typically involves sending a seemingly genuine…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    Because Mat didn’t have Google’s two-factor authentication turned on, when Phobia entered his Gmail address, he could view the alternate e-mail Mat had set up for account recovery. Google partially obscures that information, starring out many characters, but there were enough characters available, m••••n@me.com. Jackpot.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Good Essays

    These web entities are designed to look like a normal email or website, that’s how hackers convince their victims to hand over personal information.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    According to SC Magazine “Researchers with SpiderLabs, the advanced security team with information security company Trustwave, discovered a treasure trove of nearly two million pilfered credentials from a variety of companies, including Facebook, Google, Yahoo, Twitter, LinkedIn and payroll service provider ADP.” I was able to verify this portion of the article when the information was provided from a known credible news source (CNN). The security breach made national news and was also provided on our local News4 as well.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    But, the actual compromise data did not fall into the criteria of what the law required for notifications. This created an ethical dilemma for the Executive team, just because the law states that notification does not require notification for the data type in the breach. But, the heavy-handed control of the Executive staff team, he forced public notification that a larger number of data elements were compromised, under protest of other Officers. Even though the first notification was not correct, the media decided to combine both notifications and came to the conclusion of how many data elements were access during the breach. With the prevailing news stories, correct or not, Target’s reputation and sales suffered, Chief Marketing Officer Jeffrey Jones summed it up the best, “That’s hammering us” (Kinicki & Williams, 2013, pg. 37,…

    • 823 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    During 2014, Home depot had the credit card information of 56 million customers stolen, and the email addresses of 53 million customers. Though the data stolen did not contain the passwords of the emails, they had other ways of trying to get the passwords. One of these ways was phishing, and they did this by sending emails to the recovered email accounts, to see if they would put in their information. The hackers…

    • 230 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Emails can be hacked by various methods, and no one is immune. Recently even Presidents G.H. and G.W. Bush have had their emails hacked and information downloaded (Kim, 2013), (Rumors, 2013). By using different methods and the internet, Hackers are using Social Engineering, Google Hacking and Workplace Sabotage from a disgruntled former employee or ones who feels that they have an injustice done to them and are motivated for revenge (Link, 2013).…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    In trying to clear the e-mail file, a flawed computer script was created that concatenated over 800 individual e-mail messages, which contained personal identifiable. At least nineteen of the e-mails reached their intended destination (Collmann & Cooper, 2007). Two members who received the email messages reported the incident to KP. Kaiser considered the breach was a significant incident due to the number of messages sent. As a result, the company created a crisis team to find the cause of the breach. The Kaiser crisis team notified its members and issued a press release three days after the breach.…

    • 1186 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    From reading the article, I can see where some of Target’s officials made some treacherous mistakes. Even though Target has been business over 50 years, they are still susceptible to the computer hackers of today. So, the main question should be, If Target had everything in place and they were notified of the breech in the security information, why did this happen? (GaleGroup,2014). Was it just pure human error and oversight or was there a bigger failing plan? Nevertheless, CEO Steinhafel, was looking out on behalf of the public consumer, when he chose to tell Americans exactly how many accounts had been possibly hacked instead of allowing his staff to have him report a lower number. (Kinicki & Williams, 2016). He chose to show true integrity…

    • 191 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It is almost impossible to find the top reasons why most security breaches happen on a secure network compromising hundreds to thousands of users’ personal information. This happens today more often than one would like to think and the consequences are astronomical for users, employees and customers of the companies. To protect a network and thoroughly secure confidential information, one has to examine the top vulnerabilities and think outside of the normal box to protect the network. When a security breach happens, there is usually a pretty simple reason why it has happened. This paper will discuss one of the highly publicized security breaches to happen in years, the Sony PlayStation Network & Qriocity music and video service that occurred early this year. There will be a discussion on the actual breach that occurred, what caused the breach and how this could have been prevented, and finally, how Sony plans to recover from this monumental loss of confidential data it caused its customers.…

    • 1165 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The information exposed in this hack is a treasure trove for potential identity thieves. It would…

    • 537 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ethics Paper

    • 1672 Words
    • 7 Pages

    | |within the IT department, was able to hack into Aaron Webs system and find the source of the leak, | |…

    • 1672 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 252 Words
    • 2 Pages

    In agreement to the FTC, “hackers” could access anyone’s personal information at ease, change protected passwords without security questions, look at chats sent back and forth to a friend, and “send tweets” while using another person’s Twitter (Sangani, par. 21). According to Sangani, these so-called specialists accessed this information between January and May of 2009. Specialists had achieved information from over 45 different accounts in January, says Twitter, and approximately 10 in April of 2009. Luckily, it was only “for short periods of time.” (Sangani, par. 22).…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Target a large retail corporation that operates over 1,700 stores across the United States. They also operate as an online retailer at target.com. In 2012 the retailer earned more than $73 billion dollars in revenue and grew their sales by 5.1% from the previous year. Looking at the revenue and sales growth rate it is hard to fathom that more money could not be spent to ensure that consumer data is protected as much as possible. As information security specialists one of the worst things that can happen is our network gets infiltrated and customer information is stolen. On December 19, 2013 Target released a statement stating that they have had an information security breach and suggested that as much as 70 million credit card information had been stolen.…

    • 1162 Words
    • 5 Pages
    Better Essays