Recently, all kinds of famous "goddess" of the photos of the storm broke out

Source: Internet
Author: User
Keywords Hollywood black hands supporters.
Tags apple big-name broke broke out clean up hackers how to information

Recently all kinds of "goddess" of the photos of the scandal broke out, a big wave of Hollywood photos are pouring in, instant sensation around the world. According to foreign media reports, a total of 101 female stars in Hollywood are involved, "topless army" involving Lawrence, Avril Lavigne, Rihanna, Johansson and other big-name actress. And a mysterious man recently issued a statement claiming that he is a large number of Hollywood stars nude photo exposure behind the scenes, the large photo of the outflow will be grateful to those in the icloud store photos of the "share." The FBI is reported to have been involved in the investigation. Photos behind the scenes: The plan has long thanked icloud "share" to mention the pornographic, many people first reaction is the 2008 Chinese Entertainment Circle Chen incident. Today, Miss Chen's "negligence" of the actress is still difficult to get rid of the shadow of the event. and Chen teacher "Yan Yan Door" incident is different, this time the Hollywood photos of the scandal involving a large number of international idol, netizens big sigh of European and American superstar "figure bump has had, let human blood spray Zhang", this can not help but the spread of the incident more "burning more prosperous" trend. The stars of the European and American empires are also difficult to escape the clutches of "Yan Zhao Door"? In the final analysis, because the actress is keen on self-portraits, and the increasingly high-tech smartphones are around the "sky Eye", through the smartphone icloud storage outflow of Hollywood actress photos to make the privacy of mobile phone security has a deeper concern. 360 Mobile security experts said that the daughter star photos of the large-scale leakage of the specific reason may be that hackers use brute force to crack the icloud cloud storage services, Apple mobile phone access to these actress's iphone and wantonly steal copies of the various "indecent and self-portraits" pictures. And the ultimate goal is to publish it online in exchange for "bitcoin." The mysterious man who claimed to be behind the scenes confirmed the expert's claim and said the "pornographic" incident was not a personal one, but rather a result of months of "hard work" by many participants. At the same time, the man said he had shifted his position to escape the hunt and thanked the "supporters" who shared the photos. Apple recently issued an official statement denying its vulnerabilities and the possibility of being exploited by hackers and attributing all the problems to the overly simple setting of the victim's password. But this has failed to deter industry and users from speculating about Apple's extremely serious security vulnerabilities. A few days ago, the FBI has launched an investigation. Privacy protection put on the agenda: How to crush important privacy information? The Hollywood scandal let us have to face the issue of privacy security, many people first time to turn out their albums, watching their occasional narcissism photographed "sexy photos, intimate photo", now become a "hot potato." Narcissism is the nature of every woman, is the so-called "natural beauty difficult abandon", the birth of a proud person's stature is a lot of women dream things. Youth fleeting, leaving "graceful posture" of the image is not, but girls should know how to protect themselves, to know You "secret" most of the "confidant" to install a professional software,While protecting it, it is protecting itself. 360 Cleaning master with "Privacy Grinder" feature not only can a key to clear the privacy traces, but also smash the privacy photos, privacy messages and call records, not in the smartphone left any information related to privacy, there is this "kill" type of software is now "Meng Meng" posture lying in a small series of mobile phone. Figure: 360 Clean up the master "privacy grinder" can let hackers do 360 clean up the master's "privacy protection" can easily use the user to find the phone has not completely deleted all the data, the information completely shattered, so there is no need to worry about the return of mobile phone privacy caused by leakage. In addition, the phone eavesdropping function can effectively prevent users from receiving and dialing the phone when the Trojan virus eavesdropping. Hollywood's "pornographic" incident continues to spread, and the actress involved may be sitting on a difficult occasion. In the face of such a "tireless" event, the small series Please do not participate, let the storm in the past, but also want to remind the masses of beauty, important account must be set up a separate password and regular replacement, while trying to avoid in icloud and other cloud services to backup highly private personal information, turn off the photo sharing function.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.