The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,860 other subscribers

Getting hacked often involves social engineering and corporate policy flaws (involved: Apple, Amazon, GMail)

Posted by jpluimers on 2012/08/10

With more and more stuff being linked together in the cloud, getting hacked becomes increasingly more simple.

This time, it involved Amazon, Apple and GMail, some good knowledge on how the system works, and social engineering to sound trustworthy.

The goal was to get access to a 3-letter Twitter account, the collateral was someones digital life.

Lessons to learn from how Mat Homan got hacked:

  • Make local backups often
  • Use two-factor authentication
  • Don’t have all your devices on “wipe from the cloud”
  • Don’t bind your primary accounts together on the clouds
  • Have distinct reset accounts for your primary accounts
  • Make your primary accounts use a distinct name

Applause for Mat for coming forward on this. I know lots of people that wouldn’t.

–jeroen

via:

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.