Celebrity News Hacked Photo Leaks 2014: Most Searched On Internet, May Lead To More Hack Attacks

Tags

Celebrity News Hacked Photo Leaks 2014. 2014 saw a number of celeb photo leaks, most notably the Celebrity News Hacked Photo Leaks 2014 targeting Academy Award winner Jennifer Lawrence. The ensuing Celebrity News Hacked Photo Leaks 2014 involved more than a hundred actresses and a couple of male stars. The way the Celebrity News Hacked Photo Leaks 2014 unfolded took a toll on the private lives of A-listers like Kate Upton who took nude selfies of themselves with their iPhone and stored them on the iCloud, Apple’s storage service.

Although Apple Inc. has denied a leak from the iCloud, celebs blame Apple for the lack of security. Google was threatened with a $100 million by all the actresses involved for allowing the Celebrity News Hacked Photo Leaks 2014 to continue.

The hackers responsible for the Celebrity News Hacked Photo Leaks 2014 identified themselves as 4Chan, who have an image sharing site. Reddit users were also told not to share hacked photos after they got hold of links to the Celebrity News Hacked Photo Leaks 2014 via 4Chan’s website.

The MasterHerald reported that search interest in Celebrity News Hacked Photo Leaks 2014 and in individual celeb photo leaks ranked among the top 10 searches in a particular time frame. User interest in the search term was a surprise to many analysts who saw Celebrity News Hacked Photo Leaks 2014 rank up to the levels of searches like Malaysian Airlines, ISIS, and the recent Ferguson protests.

Commentators also say the downside of high search activity involving Celebrity News Hacked Photo Leaks 2014 include more attacks by hackers in light of the high demand from people using the Internet.

According to MasterHerald.com, “Some have been commenting that the main victim of the whole scandal have been cloud storage companies, as their services have been the target of much criticism after several particular leaks.”

Apple has also upped its security, and is encouraging users to implement a 2-factor security password system.

Join the Discussion

Latest News

Real Time Analytics