{"id":79115,"date":"2014-09-06T20:05:03","date_gmt":"2014-09-06T14:35:03","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=79115"},"modified":"2014-09-06T20:05:03","modified_gmt":"2014-09-06T14:35:03","slug":"celebrity-photo-hack-ice-bucket-malware-security-news","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/celebrity-photo-hack-ice-bucket-malware-security-news\/","title":{"rendered":"Celebrity Photo Hack, Ice Bucket Malware, and Other IT Security News"},"content":{"rendered":"<p>The past few days in the world of Internet was mostly about the hoo-ha created over the major hack of celebrity personal photos. Let us read about this and other interesting IT security news.<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-family: verdana; font-weight: bold;\">Personal Photos of Jennifer Lawrence, and other A-List Celebrities Hacked<\/span><\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/09\/celebrity-photo-hack.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-79117 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/09\/celebrity-photo-hack.jpg\" alt=\"celebrity photo hack\" width=\"600\" height=\"600\" \/><\/a><\/p>\n<p>August 31, 2014 was a day full of shock and stir in the world of Internet. Over 200 photos, mostly intimate, of most A-list celebrities were leaked online. A hacker who goes by the name \u2018original guy\u2019 seems to have mastered this incident. Our CTO, Mr. Sanjay Katkar has shared his thoughts about how users can avoid such incidents by following just 3 safety measures. Read the post <a href=\"https:\/\/blogs.quickheal.com\/3-safety-precautions-take-celebrity-photo-hack\/\" target=\"_blank\">here<\/a>.<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-family: verdana; font-weight: bold;\">Beware of Ice Bucket Challenge Emails, Links, and Social Media Posts<\/span><\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/09\/ice-bucket-challenge-malware.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-79118 size-full aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/09\/ice-bucket-challenge-malware.png\" alt=\"ice bucket challenge malware\" width=\"467\" height=\"259\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The Ice Bucket Challenge is a popular fundraising activity to support the fight against amyotrophic sclerosis (ALS). The campaign has been a great success since its inception. And this makes it a very attractive money-making proposition for online scammers. Scammers have started tricking people into downloading links embedded in emails related to this campaign. Clicking these links downloads a nasty malware on the victim\u2019s computer. Know more about this <a href=\"https:\/\/www.usatoday.com\/story\/money\/business\/2014\/08\/31\/scam-als-ice-bucket\/14692377\/\" target=\"_blank\">here<\/a>.<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-family: verdana; font-weight: bold;\">The Great Target Hack Might Have Been Accomplished in a Mere 11 Steps<\/span><\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/09\/11-steps-hackers-used-to-hack-Target.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-79119 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/09\/11-steps-hackers-used-to-hack-Target.jpg\" alt=\"11 steps hackers used to hack Target\" width=\"540\" height=\"358\" \/><\/a><\/p>\n<p>Remember the great Target hack that occurred in early January this year? Well, if you are an IT security enthusiast, then you might want to know how the hackers did it. Would you believe if we say, &#8216;Just 11 steps?&#8217; If no, then you can read all about how 70 million customers were hacked and 40 million credit\/debit cards were stolen in just 11 steps, <a href=\"https:\/\/www.networkworld.com\/article\/2600805\/security0\/11-steps-attackers-took-to-crack-target.html\" target=\"_blank\">here<\/a>.<\/p>\n<p><span style=\"font-size: 15px; color: #006bb2; font-family: verdana; font-weight: bold;\">Android Users Vulnerable to Man-in-the-Middle Attack<\/span><\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/09\/man-in-the-middle-attack-android-phones.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-79120 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2014\/09\/man-in-the-middle-attack-android-phones.jpg\" alt=\"man in the middle attack android phones\" width=\"456\" height=\"266\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Those of you who still believe that Android is a a less favorite target of hackers, then here\u2019s an update from the Computer Emergency Response (CERT) that might lay things into perspective. According to CERT, about 350 Android apps that are easily available in Google Play are vulnerable to man-in-the-middle attacks. These attacks allow hackers to intercept the flow of data between two legitimate parties. Having gathered the information, the attacker can manipulate or exploit the information for unscrupulous benefits. Know more about this <a href=\"https:\/\/www.theregister.co.uk\/2014\/09\/05\/us_cert_warns_of_android_app_maninthemiddle_diddle\/\" target=\"_blank\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The past few days in the world of Internet was mostly about the hoo-ha created over the major hack of celebrity personal photos. Let us read about this and other interesting IT security news. Personal Photos of Jennifer Lawrence, and other A-List Celebrities Hacked August 31, 2014 was a day full of shock and stir [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":79121,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[1036,1037,1038],"class_list":["post-79115","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-android-man-in-the-middle-attack","tag-celebrity-photo-hack","tag-target-hack"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/79115"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=79115"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/79115\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=79115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=79115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=79115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}