Posted: January 24, 2017 Filed under: Crime & Corruption, Entertainment, Mediasphere, U.S. News | Tags: Amber Heard, Celebrities, Chicago, Edward Majerczyk, Federal Bureau of Investigation, Hack, iCloud, Jennifer Lawrence, Kate Upton, Kirsten Dunst, Los Angeles, Phishing, Plea, Pornography, Theft, Twitter
Majerczyk faced up to five years in prison. His lawyers argued in a sentencing memo that his participation was limited to the unauthorized access of information on his personal computer, ‘for his personal use and viewing only.’
“Majerczyk sent phishing emails to his victims, tricking them into providing their usernames and passwords to a third-party website, according to a plea agreement. He in turn used the information to access their accounts, leading to material belonging to more than 300 victims.”
CHICAGO — A Chicago man was sentenced to nine months in a plea deal Tuesday for hacking the electronic accounts of 30 celebrities and stealing their personal data, including nude photos and videos.
[ARCHIVE – The CELEBRAGEDDON of 2014: Jennifer Lawrence Requests Nude Pics Investigation]
[MORE – Social Media Goes Cuckoo Bananas Over Massive Celebrity Nude Photo Leak]
Edward Majerczyk, 29, was accused of orchestrating a phishing scheme from November 2013 to August 2014 that netted personal information from celebrities including Jennifer Lawrence, Kate Upton and many more in Los Angeles.
Lawrence likened the privacy invasion to a “sex crime” and said she worried about its impact on her career.
Majerczyk, the son of two Chicago police officers, did not plead guilty to distributing the images. His plea was limited to
his role in obtaining them.
“At the time of the offense, Mr. Majerczyk was suffering from depression and looked to pornography websites and Internet chat rooms in an attempt to fill some of the voids and disappointment he was feeling in his life.”
After his case was transferred from California to Chicago, he pleaded guilty in September to one count of unauthorized access to a protected computer to obtain information.
A spokesman for the US attorney’s office in Los Angeles told the Chicago Tribune that the investigation into who leaked the sensitive information was ongoing.
[Coconuts: Kirsten Dunst Leads Celeb Anger at Apple Over Stars’ Nude iCloud Images Stolen]
[MORE – Nude Celebrity Leak Panic on Horizon as Mainland China Attacks Apple’s iCloud]
Majerczyk sent phishing emails to his victims, tricking them into providing their usernames and passwords to a third-party website, according to a plea agreement. He in turn used the information to access their accounts, leading to material belonging to more than 300 victims, according to the plea agreement.
Majerczyk faced up to five years in prison. His lawyers argued in a sentencing memo that his participation was limited to the unauthorized access of information on his personal computer, “for his personal use and viewing only.” Read the rest of this entry »
Posted: September 7, 2016 Filed under: Entertainment, Mediasphere, Science & Technology, U.S. News | Tags: Apple Inc, Apple Music, Google Drive, iCloud, IOS, IOS 10, iPhone, Mac OS, MacOS Sierra, OS X
- Sierra wallpaper
- Storage Recommendations (System Information)
- Optimize Mac Storage (iCloud → iCloud Drive options)
- Remove items from the Trash after 30 days
- Desktop and Documents folder live on iCloud Drive
- Keep folders on top when sorting by name
- Notification Center updated design
- Choose output from sound button in menu bar
- Move any menu bar item
- Prefer tabs when opening documents
- Tabs in maps
- Double space enters a period
- Safari and iTunes Picture in Picture
- Updated Console app
- Dwell Control
- Auto Unlock
- APFS Apple File System
- Universal Clipboard
- Intelligent Search
- Large emoji
- Inline video playback
- Inline links
Read the rest of this entry »
Posted: October 1, 2015 Filed under: Mediasphere, Science & Technology, Space & Aviation | Tags: App Store (iOS), Apple Inc, Apps, Avast, iCloud, IOS, iPad, iPhone, Malware, Xcode
WASHINGTON – Apple is known for keeping a pretty tight leash on apps, often blocking or refusing to sell programs it deems too offensive or too sexually suggestive.
The creator of an app that tracks published reports of American drone strikes around the world probably figured his program was in no danger of running afoul of Apple’s strict rules.
But this week, Metadata+ was removed from the App Store for having “excessively rude or objectionable content,” reports CNet.
The app was designed by Josh Begley, one of the editors of The Intercept, to publish data on…(read more)
Source: CBS DC
Posted: September 18, 2014 Filed under: Law & Justice, Mediasphere, Science & Technology, U.S. News | Tags: Apple, Edward Snowden, iCloud, IOS, iPad, iPhone, National Security Agency, Washington Post
The Washington Post reports: Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.
“Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” Apple said on its Web site. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.”
As the new operating system becomes widely deployed over the next several weeks, the number of iPhones and iPads that Apple is capable of breaking into for police will steadily dwindle to the point where only devices several years old — and incapable of running iOS 8 — can be unlocked by Apple.
Apple will still have the ability — and the legal responsibility — to turn over user data stored elsewhere, such as in its iCloud service, which typically includes backups of photos, videos, e-mail communications, music collections and more. Users who want to prevent all forms of police access to their information will have to adjust settings in a way that blocks data from flowing to iCloud. Read the rest of this entry »
Posted: September 7, 2014 Filed under: Entertainment, Humor, Mediasphere, Science & Technology | Tags: Avril Lavigne, Celebrageddon, celebrity, Cyberwarfare, iCloud, Jennifer Lawrence, Kate Upton, Kirsten Dunst, Malware, Rihanna, Spark Capital, Sunday, Trend Micro, Twitter
Malware trap Brings New Zealand’s Internet to its Knees
AFP – It is believed a handful of computer users clicked links on Friday evening believing they would take them to the illicit images, but instead they inadvertently installed malware triggering a crippling Internet attack.
“For obvious reasons, clicking on links to ‘naked celebrity’ photos, or opening email attachments would be a very bad idea right now, expect criminals to ride this bandwagon immediately.”
Read the rest of this entry »
Posted: September 2, 2014 Filed under: Breaking News, Entertainment, Mediasphere | Tags: Apple, Emma Watson, Federal Bureau of Investigation, iCloud, iPhone, Jennifer Lawrence, Kate Upton, Kirsten Dunst
From Mail Online: Kirsten Dunst has become the first celebrity to publicly criticize Apple after it emerged that a flaw in the ‘Find My iPhone‘ function of its iCloud service may have helped an unknown hacker steal nude photos of her and ‘100 other celebrities’.
[Also see – The CELEBRIGEDDON of 2014: Jennifer Lawrence Requests Nude Pics Investigation]
[More – Social Media Goes Cuckoo Bananas Over Massive Celebrity Nude Photo Leak]
The Spiderman star tweeted ‘Thank you iCloud’ along with icons representing a slice of pizza and a pile of poo on Monday afternoon, the day after naked photos of her were published online.
Kirsten Dunst has become the first celebrity to publicly criticize Apple after it emerged that a flaw in the ‘Find My iPhone’ function of its iCloud service may have helped a hacker to steal nude photos of her and ‘100 other celebrities’.
The supposed hacker behind the scandal has claimed that they broke into stars’ iCloud accounts, including those of Dunst, Hunger Games actress Jennifer Lawrence, Kate Upton and Rihanna, before publishing them on 4chan, the image-sharing forum.
A list of the alleged victims of the hack – a staggering 101 in total – has also been posted online; most of whom have not seen any photographs leaked by the hacker.
Yesterday, British actress Emma Watson, a friend of Lawrence, condemned the ‘lack of empathy’ shown by social media users towards victims of the hack.
She tweeted: ‘Even worse than seeing women’s privacy violated on social media is reading the accompanying comments that show such a lack of empathy.’ Read the rest of this entry »
Posted: June 8, 2013 Filed under: Mediasphere | Tags: Apple, European Union, Google, iCloud, National Security Agency, NSA, Prism, United States Foreign Intelligence Surveillance Court
Within 24 hours, the leak of two documentshas revealed a vast network of National Security Agency (NSA) surveillance operations that were authorized by FISA (Foreign Intelligence Surveillance Act) courts with the oversight of the U.S. Congress.
The first document, which Popular Mechanics detailed yesterday
, was a FISA court order demanding all telephony metadata from Verizon Business Network Services over a three-month period, though it hinted at a much broader program of call log data mining. The second document referred to a different—and apparently much larger—program aimed at real-time analysis of web traffic from nine large technology firms, including Microsoft, Yahoo, Google, Apple, and (“coming soon”) Dropbox. Details are still murky, but it’s clear that this was not some clandestine sniffing effort—it was done with the full cooperation of the companies involved (though many of the companieshave denied
that this represents an automatic backdoor into their servers).According to the document, a bizarrely low-budget internal PowerPoint from the NSA
, this Prism surveillance program could give the NSA access to email, video chat, VoIP conversations, photos, and stored data from the participating companies. Unlike the call data collection program, this program focuses on mining the content of online communication, not just the metadata about them, and is potentially a much greater privacy intrusion. James Clapper, the director of national intelligence, said in a statement that the Prism program “could not be used to intentionally target any U.S. citizen”—a statement that, given the nature of how data mining is done, should do little to allay the fears of civil libertarians.
Let’s say we take Clapper at his word: How much should we worry about a program that is aimed at monitoring the digital communications of foreigners? We should worry quite a bit, because this issue goes far beyond just respecting the civil liberties of non-Americans.
Think for a second about just how the U.S. economy has changed in the last 40 years. While a large percentage of our economy is still based in manufacturing, some of the most ascendant U.S. companies since the 1970s have been in the information technology sector. Companies such as Microsoft, Apple, and Google are major exporters of information services (if you can think of such a thing as “exportable”) through products such as Gmail, iCloud, Exchange, and Azure. Hundreds of millions of people use these services worldwide, and it has just been revealed to everybody outside the U.S. that our government reserves the right to look into their communications whenever it wants.
If you lived in Japan, India, Australia, Mexico, or Brazil, and you used Gmail, or synced your photos through iCloud, or chatted via Skype, how would you feel about that? Let’s say you ran a business in those countries that relied upon information services from a U.S. company. Don’t these revelations make using such a service a business liability? In fact, doesn’t this news make it a national security risk for pretty much any other country to use information services from companies based in the U.S.? How should we expect the rest of the world to react?
Here’s a pretty good guess: Other countries will start routing around the U.S. information economy by developing, or even mandating, their own competing services. In 2000, the European Union worked out a series of “Safe Harbor” regulations mandating privacy protection standards for companies storing E.U. citizens’ data on servers outside of the E.U. For U.S. companies, that means applying stronger privacy protection for European data than for our own citizens’ data. And now there is considerable reason to believe that Prism violated our Safe Harbor agreements with the E.U.
Has it come to this? Are we really willing to let the fear of terrorism threaten one of the most important sectors of the U.S. economy? Frankly, I expect the Prism program to fall apart on its own, not because of public outcry but because the companies that participated will now see it as a toxic association that could threaten their status in fast-growing foreign markets. If U.S. intelligence agencies try to compel participation through the courts, I expect companies such as Apple and Google to start putting up a legal fight—not just because Prism is bad public relations, because it’s bad for business.
via Popular Mechanics