Increase safety factor and add a lock to cloud services

Source: Internet
Author: User
Keywords Cloud Services
Tags account password alarm android android phone apple apple products cloud cloud era

After "pornographic", ask you a question, do you use Apple products such as the iphone and their icloud cloud storage services, and often take photos and videos that are more private? If so, you are at risk of being exposed to personal privacy. Over the weekend, Hollywood, including Jennifer, the more than 100 stars of large scale private photos and video leaked, for the cloud era of data security again sounded the alarm.

An apple accident.

There are reports that the "pornographic door" was caused by hackers attacking Apple's icloud cloud storage service. But rising security expert Tangwei in an interview with reporters that: "From the current ' Yan Zhao Door ' Many details see, privacy Disclosure and use of the product is Apple or Android phone does not have much relationship, if it is icloud what a serious loophole, then leaked information is definitely more than that point. ”

Are you using an Apple or an Android phone? You can avoid risk without icloud. The answer is no. In fact, the security of the domestic Android phone cloud services is even far lower than icloud, because there is a similar leak in the domestic precedent, such as the previous exposure of 8 million of user data leaked, but this kind of event influence far less than Hollywood star Zhao Yan door, so not be popular attention.

Some of the domestic cloud storage services do exist important security risks, such as some cloud storage does not have the strength of the password constraints, no limit attempts to login, the landing process in clear transmission of passwords, the password to modify the existence of a logical loophole and other low-level security issues, users when cautious use.

One machine, cloud risk

"Usually the important information is stored separately. "Nanjing residents Liu Huancheng as" fruit powder "for two years, has never been such a encounter. He feels that icloud is very good at speed, but remains vigilant about security issues, "I have a paper notebook to record things that are important to me." "The same with Apple's Nanjing Audit College senior students Cai Minjiao, there is no privacy leaked experience." However, she is not using cloud storage services, but the use of Baidu network disk. When asked if the "pornographic door" will affect her use of apple, she felt not: "Never used icloud service, so it has no effect on me." ”

In fact, the account password has the risk of leakage. Cloud storage brings convenience to users while also bringing great security risks. Because the account password is a key to cloud services, once the hacker gets it, all cloud data can be stolen and leaked. Cloud services are more vulnerable to attacks than the previous hacker attacks on PCs, involving privacy data on different devices such as mobile phones and tablet computers.

Security is relative, and before the advent of the smartphone era, we also had the risk of using email. The most important thing is that you must improve your network security awareness.

What can we do to protect our privacy?

What can we do as an ordinary mobile phone user? Use the cloud storage carefully, encrypt the privacy data, make the password complex enough and change the password frequently. In addition, timely updating of the software is also a good way. In the early days of some software release, there may be some undetected security vulnerabilities, software providers if they can detect and quickly updated to make up for, then users should be upgraded in time, or you risk will be higher than others.

Personal privacy data should be carefully uploaded back to the cloud, because the cloud service is enabled, even if the mobile phone deleted the privacy information, it is possible that the ' cloud ' is still on; important account to be set up a separate password and regular replacement; do not download the unknown mobile phone application; Learn to encrypt privacy data using mobile phone security software, and try to avoid using other people's devices or untrusted WiFi network login accounts.

If it is a particularly important account, try to choose multiple authentication mechanisms, such as U shield, mobile phone token, SMS authentication code, and not just rely on the password. For particularly important or private data, if you must store it on the web, it is best to use a "file safe" and other multiple encryption protection services.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.