Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Neustar, Inc.
Protect your website & network
using real-time information & analysis

www.neustar.biz
Network Security
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Wozniak Says Cloud Issues
Wozniak Says Cloud Issues 'Horrendous'

By Barry Levine
August 7, 2012 1:15PM

    Bookmark and Share
While Steve Wozniak's main concern is with cloud user agreements, there are security issues as well. Wired reporter Mat Honan reported that his iCloud account had been hacked on Friday, and that the intruder had remotely wiped the shared content on all of his devices -- including MacBook Air, iPhone and iPad.
 



Apple co-founder Steve Wozniak has expressed his doubts about the wisdom of storing so much in the cloud. The comments were made in a question-and-answer session Saturday, following the Wash., D.C., solo performance of The Agony and Ecstasy of Steve Jobs, which Wozniak attended.

"I really worry about everything going to the cloud," he told the audience. He added that "it's going to be horrendous," with a lot of "horrible problems in the next five years."

Losing Control?

A key issue bothering Wozniak is that users could lose control of their cloud-stored material, such as turning over control of their rights in exchange for accessing the service.

Wozniak said that he wanted "to feel that I own things," while the "more we transfer everything onto the Web, onto the cloud, the less we're going to have control over it."

At various times, industry observers have also raised concerns about those agreements, which users rarely read. Potential issues include data mining of user material, or restrictions on how legally purchased material can be used.

Although Wozniak's criticism was largely based around the agreements that users accept to use cloud services, recent security breaches in cloud-based sharing and storage services have illustrated other weaknesses.

Earlier this week, for instance, Wired reporter Mat Honan reported that his iCloud account had been hacked on Friday, and that the intruder had remotely wiped the shared content on all of his devices -- including a MacBook Air, iPhone and iPad. The hacker also changed his Gmail account password and erased the contents on that account as well.

'Wasn't Password Related'

Honan said he has "confirmed with both the hacker and Apple" how the intrusion occurred. He noted that it "wasn't password related," and that he had created a 7-digit alphanumeric password which should have been reasonably secure. Instead, Honan said, Amazon provided four digits of a credit card number of his to the hacker, and Apple used that fragment to perform identity verification.

He added that Apple is making an attempt to help him recover the data erased on his MacBook.

Also recently, a list of an unspecified number of Dropbox names and e-mail addresses was stolen when a Dropbox account of an employee of that service was hacked. The account contained the confidential list of information. Apparently, the employee's account was hit after some passwords had been stolen, and the company noticed when users began complaining of spam that was being sent to their Dropbox-only e-mail addresses.

Dropbox has announced several new security measures. Within a few weeks, for instance, a two-factor authentication will be implemented. This will require two kinds of identity in order to sign in, such as the password and a temporary code sent to one's phone.

The company will also use a new automated mechanism to help identify suspicious activity, and a new page will allow users to see all active log-ins to an account.
 

Tell Us What You Think
Comment:

Name:

Keith:

Posted: 2012-08-09 @ 12:19pm PT
I find it hard to believe in this day and age, with the type of characters we have out there--their anything to F the system mentality--that the cloud being unhackable was even the slightest bit credible. I will avoid it at all costs, as this is going to get worse, not better. Hackers have always been ahead of the companies that try to stop them; it seems likely now that they always will be. I will continue to keep all of my content on hard drives I can take with me.



Neustar, Inc. (NYSE: NSR) is a trusted, neutral provider of real-time information and analysis to the Internet, telecommunications, information services, financial services, retail, media and advertising sectors. Neustar applies its advanced, secure technologies in location, identification, and evaluation to help its customers promote and protect their businesses. More information is available at www.neustar.biz.


 Network Security
1.   Chinese Hackers Hit U.S. Officials
2.   Russian Hacker's Charges Revealed
3.   Another IE-Focused Patch Tuesday
4.   Russian Arrested in Hacking Case
5.   Most Networks Not Ready for IoT


advertisement
Android SMS Worm on the Loose
Malware lets bad actors cash in.
Average Rating:
Another IE-Focused Patch Tuesday
One critical for Internet Explorer.
Average Rating:
Most Networks Not Ready for IoT
But most enterprises are prepared.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Report: Chinese Hackers Hit U.S. Personnel Networks
Hackers from China broke into the computer networks of the U.S. Office of Personnel Management earlier this year with the intention of accessing the files of tens of thousands of federal employees.
 
Charges: Russian Stole Data from U.S. Restaurants, Zoo
A Russian man arrested on bank fraud and other charges hacked into computers at restaurants in Washington, hundreds of other retail businesses, and even the Phoenix Zoo, authorities say.
 
Another Month, Another IE-Focused Patch Tuesday
Microsoft rolled out 59 vulnerabilities for Internet Explorer in June. But the IE-patching party is not over yet. Redmond published six new security bulletins on Tuesday; two, critical; three, important.
 

Enterprise Hardware Spotlight
Another Day, Another Internet of Things Consortium Is Born
In the emerging Internet of Things, zillions of devices will be talking to each other. Samsung, Intel and Dell just formed a consortium to ensure each thing can understand what others are saying.
 
Gartner Sales Study Sees Tablets Up, PCs Down but Recovering
Are PCs on the comeback trail? That depends on how you define "comeback." While tablet sales remain strong, Gartner's latest study found PC shipments aren't dropping as fast as they did last year.
 
Review: Warming Up to Tablets with Keyboard Covers
If you've ever thought tablets with keyboard covers were just a poor excuse for a laptop, think again. Nokia's Lumia 2520 comes with an optional keyboard cover that just may change your mind.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.