Hacking iPhone and Instagram: numbers of a phenomenon and practical advice to defend oneself - Cyber Security 360 OUR SERVICESSERVICESFollow us PREMIUM AREAWhitepaperEventsWebinarCANALICnational cybersecurityMalware and attacksRules and adjustmentsBusiness solutionsCyber cultureThe expert answersNews analysisHow we are Hackware
Internet searches are on the rise to find the correct procedures for hacking iPhone and Instagram. Here are the numbers of an increasingly widespread practice and some practical tips to secure our device and social account
10 Mar 2020RWalter RocchiTrainer, GDPR, ISO27001 LI / LAAmong the new keywords most searched for on Google are "Hack iPhone and Instagram".
A study by Case24.com (a UK-based smartphone case maker) revealed that hackers are more likely to target Apple's Instagram and iPhone accounts than other devices. The researchers said they used Google's UK and US search data for the study.
According to the research results, about 10,040 users, "photographed" in a period of 30 days were trying to find information on how to hack iPhone. Meanwhile, other mobile phone brands, including Samsung, Huawei, LG, Nokia and Sony, ranked well below the iPhone / Instagram pairing.
Meanwhile, searches for the phrase "how to hack iPhone" in the US have been launched by the Mountain View search engine 48,010 times.
Using the same search metrics, the researchers said UK users are interested in how to hack Instagram accounts, with over 12,310 search results, while Snapchat ranked second (7,380 searches) and WhatsApp (7,100 searches). ) in third position. In the United States, some 66,960 Americans have searched for "how to hack Instagram".
Index of topicsHacking iPhone and Instagram: looking for bugs
The study may not have used the best approach, meaning it doesn't look professionally done at all, but the results are compelling. Both Apple and Instagram reported serious security breaches last year.
WHITEPAPERCustomer Experience: how to offer customers a quality experienceMarketingDownload the WhitepaperIn 2019, Instagram revealed that an unsecured server containing the personal information of millions of influencers, celebrities, and famous brand accounts exposed 49 million records online.
According to security researcher Anurag Sen, who discovered the leak and notified TechCrunch, the database exposed more than 49 million records online, allowing anyone to access them. The data exposed included the personal data of the users, the profile picture, the number of followers they have, their location by city and country and contact information such as the email address and telephone number of the owner of the Instagram account.
Commenting on the security breach, Facebook said at the time: “We are investigating the issue to understand whether the data described, including phone and email numbers, came from Instagram or other sources. It seems that even Chtrbox itself did not understand where this data came from and how it became available to the public ”.
While the Facebook group takes cover by providing constant security updates (remember that the "brands" WhatsApp and Instagram are also owned by Mark Zuckerberg), last December Apple relaunched the Big Bounty program, or "error hunting") which had closed months ago.
The company made the announcement earlier this year at the Black Hat security conference in Las Vegas.
Until now, Apple has organized an invitation-based bug reward program for select researchers and only accepted bugs related to iOS. As of now, the company accepts vulnerability reports from all security researchers and for a range of products including iPadOS, tvOS, watchOS, macOS and iCloud.
Apple has released an official announcement detailing the rewards program rules for discovered bugs, along with a breakdown of the rewards. The company also increased its maximum reward from $ 200,000 to $ 1,500,000, based on the complexity and severity of the exploit.
“As part of Apple's commitment to security, we reward researchers who share critical issues with us and the techniques used to exploit them. We prioritize resolving confirmed issues as quickly as possible in order to best protect customers. Apple offers public recognition to those who submit valid reports and will match bounty payment donations to qualified charities, ”Apple said in a statement.
In order to get the maximum rewards and other bonuses, researchers must submit clear bug reports, which include:
Apple also mentioned a detailed set of gift categories ranging from a minimum reward of $ 25,000 to a maximum of $ 1,000,000.
Tips for defending yourself
So let's see some simple tips to prevent some attacker from hacking the iPhone and our Instagram account.
As for Instagram, private albums and if possible, completely avoid private photos with children and so on.
It is also important not to accept friendships without a real reason: before doing so, let's ask ourselves if we really know the person who asked us for the contact.
Finally, it is essential to create a particularly strong password and therefore difficult to find can be helpful, both for Apple and for Instagram. To be clear, we do not use a trivial 1234 string: much better to use an access key to our iPhone or Instagram account consisting of at least 8 characters including lowercase and uppercase letters, numbers and special characters.
@PRODUCTION RESERVEDCharactersWWalter RocchiArgomentiAAndroidFfacebookHHackerIiPhonePpasswordSsonyV VulnerabilityChannelsMalware and hacker attacksShareNextNext Data breach: practical examples of EDPB to report a personal data breachYour content, your privacy!
On this site we use technical cookies necessary for navigation and functional to the provision of the service.We also use cookies to provide you with an increasingly better browsing experience, to facilitate interactions with our social functions and to allow you to receive marketing communications adhering to the your browsing habits and your interests.
You can express your consent by clicking on ACCEPT ALL COOKIES.
You can always manage your preferences by accessing our COOKIE CENTER and obtain more information on the cookies used by visiting our COOKIE POLICY.
ACCEPT MORE OPTIONSCookie Center
ACCEPT ALL REJECT ALLThrough our Cookie Center, the user has the possibility to select / deselect the individual categories of cookies that are used on websites.
To obtain more information on the cookies used, it is however possible to visit our COOKIE POLICY.
ACCEPT ALL REJECT ALLTECHNICAL COOKIES
Strictly necessaryTechnical cookies are necessary for the functioning of the website because they enable functions to facilitate user navigation, who for example can access their profile without having to log in each time or can select the language in which they want to browse the site without having to set it whenever.
ANALYTICAL COOKIES
Analytical cookies, which can be first or third party, are installed to collect information on the use of the website. In particular, they are useful for statistically analyzing accesses or visits to the site itself and to allow the owner to improve its structure, navigation logics and contents.
PROFILING COOKIES AND SOCIAL PLUGINS
Profiling cookies and social plugins, which can be first or third party, are used to track user browsing, analyze your behavior for marketing purposes and create profiles about your tastes, habits, choices, etc. In this way, for example, it is possible to transmit targeted advertising messages in relation to the user's interests and in line with the preferences expressed by them while browsing online.
SAVE AND EXIT It has the mission of spreading digital and entrepreneurial culture in Italian companies and public administrations. ALL THE HEADSApplications and TechnologiesAi4Business Bigdata4Innovation Big Data & Analitycs ZeroUnoBlockchain4Innovation Cloud Computing ZeroUnoCybersecurity CorComCybersecurity360 Documents AgendaDigitale.eigendaCommerce Agenda 4.0Digenda.eu .euIndustry4Business Internet4Things PagamentiDigitali RiskManagement360 Searchdatacenter ZeroUnoSearchsecurity ZeroUnoSicurezza AgendaDigitale.euSmart City AgendaDigitale.euSmart Mobility EconomyUpDigital TransformationAgendaDigitale.eu Corcom Digital4Executive Digital4PMI TechCompany360 Zerouno Funzioni di BusinessDigital4Finance Digital4HR Digital4Legal Digital4Marketing Digital4Procurement Digital4SupplyChain Procurement AgendaDigitale.euIndustryAgrifood.tech AutomotiveUp BankingUp EnergyUp HealthTech360 Industry4Busines s Innovation Post InsuranceUp Media CorComProptech360 RetailUp Sanità AgendaDigitale.euScuola AgendaDigitale.euTelco CorComTurismo AgendaDigitale.euPACittadinanza AgendaDigitale.euForumPA PA Digitale CorComSanità AgendaDigitale.euScuola AgendaDigitale.euStartup e Open InnovationEconomyup StartUp AgendaDigitale.euStartupbusiness StudentiUniversity2business IndirizzoVia Copernico, 38Milano - ItaliaCAP 20125Contattiinfo@digital360.itICT&Strategy Srl - DIGITAL360 Group - Tax code 05710080960 - VAT number 05710080960 - © 2022 ICT & Strategy. ALL RIGHTS RESERVED Site mapcloseCode RssClick on the button to copy the RSS link to the clipboard.
Copy linkcloseCodice RssClick on the button to copy the RSS link to the clipboard.
Copy link