Reporter hacking incident reveals perils of digital age

Advertisement
By Agence France-Presse | Updated: 11 August 2012 20:29 IST

The perils of modern dependence on Internet-linked gadgets and digitally-stored memories remained a hot topic on Friday in the wake of a hack that wiped clean a Wired reporter's devices.

Mat Honan laid out at wired.com in gripping detail how his "digital life was destroyed" right down to irreplaceable photos of his baby daughter. Honan next week is to share his quest to repair the damage.

"The take-away from his bad experience is that people need to be careful with using an online service, especially a backup service," Lookout Mobile Security engineer Tim Strazzere told AFP on Friday.

Advertisement

"The main part is to mitigate risk; he lost a lot of personal information."

Advertisement

Basic hacker skills were combined with "social engineering," the art of sweet-talking someone like a customer service rep into bending rules during a phone call, to compromise Honan's Google, Twitter, and AppleID accounts.

Honan told of his @mat Twitter handle apparently being the coveted prize for hackers who deleted his Gmail account and erased the data from his iPhone, iPad and MacBook laptop computer to hide their trail.

Advertisement

The data-wiping feature was created by Apple to let people protect digital information if devices are lost or stolen.

He said his Twitter account was used to fire off offensive messages.

Advertisement

"In many ways, this was all my fault," Honan wrote. "My accounts were daisy-chained together."

"But what happened to me exposes vital security flaws in several customer service systems, most notably Apple's and Amazon's."

Hackers were able to get bits of information from Apple and Amazon tech support that helped them achieve their mission, according to Honan.

Apple did not respond to an AFP request for comment, but reportedly gave Honan a statement saying his data was "compromised by a person who had acquired personal information about the customer."

"In addition, we found that our own internal policies were not followed completely. We are reviewing all of our processes for resetting account passwords to ensure our customers' data is protected."

The "daisy chain" mistake Honan described is especially perilous when it involves making links between work and personal accounts, according to Strazzere.

An example would be using one's personal email address as the place to send password reset messages automatically generated by online services that require login information.

Getting access to a personal email account could then give hackers keys to any password protected services someone uses - such as Twitter, Facebook or office email.

"It is an interesting twist to the new age," Strazzere said. "These new capabilities are great tools, but it is a scary thing that if one gets compromised it can hurt you so much more."

His recommendations included keeping work and personal online accounts separate, even going so far as to have "throw-away" Web-based email accounts for matters such as password resets.

Pictures, documents or other data stored in the Internet "cloud" or on personal devices should be backed up as well as being encrypted.

Some online services provide the option of "two-factor authentication" that tightens security on password resets.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Cloud, Gmail, Hacking, iCloud
Advertisement

Related Stories

Popular Mobile Brands
  1. Apple's iPhone 18 Pro, iPhone Fold May Feature a Relocated Selfie Camera
  2. OnePlus 15R With 7,400mAh Battery, Snapdragon 8 Gen 5 Debuts at This Price
  3. OnePlus 15s Visits BIS Certification Website; Could Launch in India Soon
  4. Vivo V70 Stops By US FCC Database Along With RAM and Storage Details
  5. OTT Releases of the Week: Thamma, Mrs Deshpande, Nayanam, and More
  6. OnePlus Watch Lite With Up to 10 Days Battery Life Launched: See Price
  7. OnePlus Pad Go 2 Launched in India With 10,050mAh Battery, 5G Connectivity
  8. Nvidia's GeForce RTX 50 Series GPUs Are About to Be Scarce
  9. OnePlus 15R Review
  10. Samsung's 2nm Exynos 2600 Details Leak With 10-Core CPU and AMD GPU
  1. Samsung Exynos 2600 Details Leak Ahead of Galaxy S26 Launch; Could Be Equipped With 10-Core CPU, AMD GPU
  2. Vivo Y50e 5G, Vivo Y50s 5G Appear on Google Play Console; Mysterious Vivo Phone Listed on Certification Site
  3. Nvidia to Reportedly Cut GeForce RTX 50 Series GPU Production Amid Global RAM Shortage
  4. Apple Allows Third-Party App Stores, Relaxes Payment Restrictions in Japan to Comply With MSCA Act
  5. Hogwarts Legacy Has Sold 40 Million Copies, Warner Bros. Games Announces
  6. OnePlus 15s Listing on BIS Certification Website Hints at Imminent Launch in India
  7. Infinix Xpad Edge Launched With 13.2-Inch Display, 8,000mAh Battery: Price, Specifications
  8. Ethirneechal Thodargiradhu Now Streaming on SunNXT: What You Need to Know
  9. The Villainess Is Adored by the Prince of the Neighbor Kingdom OTT Release Date: Know When and Where to Watch This Japanese Anime Series Online
  10. Easygoing Defense by the Optimistic Lord Anime to Stream on Crunchyroll in January 2026
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.