Media SomethingMedia Something

  • ABOUT US
  • SERVICES
    • WEB & GRAPHIC DESIGN
    • BRANDING
  • WORK
  • BLOG
    • SOCIAL MEDIA
    • APPS
    • SOFTWARE
    • TRENDS
    • INSIGHTS
    • ENTERTAINMENT
  • CONTACT US

Tag: Apple

How To Protect Yourself In The Cloud

Friday, 05 September 2014 by Media Something
Tweet

The massive iCloud hack that exposed photos of female actresses stored in their personal Apple accounts, has left many—including myself—scrambling to change their passwords.

Some speculated that the hack was due to a vulnerability in Apple’s Find My iPhone feature, with which hackers used a “brute force” attack to guess the passwords on celebrities’ accounts, The Next Web reported.

Apple has since denied those reports, instead claiming it was a “very targeted attack” on usernames, passwords, and security questions—the keys to nearly any online account.

If celebrities can be attacked, so can you. So what can you do?

Understand The Cloud

Strong passwords are just one way Internet users can protect themselves from having their data stolen by malicious attackers. And photos aren’t the only things we have to worry about. Everyone tut-tutting actresses for taking risqué photos should think twice about where their personal data is stored. Oh, that’s right—it’s in the cloud, too.

The thing about “the cloud,” is that no one really understands it. It’s a deliberately vague term for computer servers you access over the Internet.

Remember the scene from Zoolander when Owen Wilson’s character suddenly has an epiphany that “the files are in the computer”—and then tears open the machine looking for them? When it comes to the cloud, our understanding hasn’t improved much.

Even CNN doesn’t know how to explain the cloud to viewers. It ran a story with the lower third “Leaked Nude Pics May Be From The Cloud.”

01_Bwie_wRIIAAStJc

Cloud servers are like any computer: You can put files on them, and access them later. Since they’re on the cloud, you don’t have to have access to a physical device, or worry about how much space your laptop’s hard drive has, since cloud servers typically have far more space than our own personal machines do.

The tradeoff for this convenience is security. If you can access your files using a username and password, so can anyone else who gets ahold of your credentials. And you have to rely on those companies to implement smart versions of the latest security protocols.

Cloud storage service likes Dropbox, Box and Google Drive make it simple to save and share files. iCloud, Apple’s cloud storage, automatically backs up your information like photos and documents, in case your phone or laptop needs to be replaced.

We have a fundamental expectation of privacy and security when using these services, especially when a company is automatically backing up the information to its servers. But that expectation can fail us.

Find The Right Cloud Storage

It’s hard to completely secure your cloud storage without jumping through a lot of hoops, which we’ll get to shortly. But the first step is figuring out where you want your documents to be stored.

Don’t sign up for new cloud services without researching it. That includes reading the privacy policies of any company you agree to give your data to. Do they have encryption built in? Do they give your data to governments when requested? Do they control their own servers, or do they rent out servers from other companies? (Dropbox and Apple, for example, both use Amazon’s servers for a portion of their online services.)

If security is your top priority, you might consider services like SpiderOak, which automatically encrypts all your data and prevents even the company from knowing what you’re uploading. But that means giving up the ease of sharing files with friends through Dropbox or collaborating with colleagues using Google Drive.

For most of us, convenience usually wins out. You should at least know that you’re making that tradeoff, however.

Use Secure Passwords

According to Apple, the hackers targeted usernames, passwords and security questions, which are the first lines of defense for users.

Simply changing an “S” to a “$” does not make your password secure—especially if you recycle that password from site to site. Hackers attack less secure services and harvest usernames and passwords—and then try them on other services.

02_How_To_Protect_Yourself_In_The_Cloud

Adding unique characters along with letters and numbers is smart, but so is using passwords that are hard, if not impossible, to guess. The best passwords are a collection of random letters, numbers and punctuation, without any words you’d find in the dictionary. And each online account should have a different, complex password.

Does that sound impossible to keep track of? It pretty much is, unless you get some computerized assistance. Password managers like 1Password andLastPass provide a way to save and manage passwords, and you can carry and access your data on multiple devices.

Enable Two-Step Verification

If someone is trying to illegally access your personal information from the cloud by using your password, you might not realize it—unless you have two-step verification enabled.

With two-step verification, it’s necessary for you to input two different pieces of data in order to access your personal information. Typically, that’s your password and a different code sent as a text or generated by an app on your mobile device. The code will change each time you log in.

Two-step verification can be frustrating and time-consuming, which is why many consumers elect to ignore it. But it saves you from having to clean up the potential mess a hacker could make with your credit card information or naked pictures stolen from the cloud.

Google, Dropbox, Apple, Box, Amazon Web Services and Microsoft are just some of the companies that offer two-step authentication.

Encrypt Your Files

If you’re not using a service that automatically encrypts your files, like SpiderOak or Mega, you may want to encrypt them yourself.

Google, Dropbox and Microsoft don’t offer file encryption as a built-in feature. While they may encrypt your transmissions between data centers, once you’re logged in, the files are available in unencrypted form. Most consumers don’t request it, because it can be difficult to use, and encryption can be complicated for companies to enable, according to Wired.

Imagine Google Drive with no search capabilities, or Dropbox with no preview. None of those features would work with encrypted files, because they’d be unreadable by Google and Dropbox’s server software. And if Google doesn’t have the encryption keys it can’t help you out if you lose a password.

Boxcrytor and Viivo both offer DIY cloud encryption, which means you can encrypt all your files before uploading them to the cloud. These companies won’t have access to your secret keys to decrypt files, which means your data is safe from prying eyes that don’t have access to your unique key.

Ultimately, we’ll need better forms of protection. Apple’s TouchID fingerprint sensor is an interesting example of authentication using biometrics, or physical aspects of our bodies. PayPal’s Braintree aims to detect fraud by looking at information about how we’re using our mobile phones at the time we make a transaction. Companies are using sophisticated behavioral modeling to detect hackers on their networks: Perhaps one day, we’ll be protected by similar technology that can tell through the way we tap on our phone’s keyboards or the time of day we access our devices that we are who we say we are.

Until then, we’re left changing our passwords, enabling two-factor verification, and hoping for the best.

Source: readwrite

Applecloudcloud securitycloud storagecybersecuritydata securityGoogleHackicloudiCloud hackpassword managerpasswordsreadwrite
Read more
  • Published in Blog, Insights, Software
No Comments

People Buy From Apple But Want To Work For Google, Study Finds

Thursday, 24 October 2013 by Media Something
Tweet

Apple and Google are currently locked in a mobile death match, with Google’s Android trouncing Apple in market share but Apple skimming most of the profits. In terms of attracting employees, however, Google claims top spot, according to a new LinkedIn analysis of the world’s most in demand employers. And when it comes to employee satisfaction, Google has taken a solid lead.

Does it matter?

Google And Apple In High Demand

Given how important both Google and Apple are to key markets like mobile, it’s perhaps not surprising that the two come in first and second, respectively on LinkedIn’s rating of in-demand employers. These are companies that are shaping the future, and job seekers clearly want a piece of the action.

Here are LinkedIn’s top-10 most in-demand employers:

  1. Google
  2. Apple
  3. Unilever
  4. Procter & Gamble
  5. Microsoft
  6. Facebook
  7. Amazon
  8. PepsiCo
  9. Shell
  10. McKinsey & Co.

Outside the top-10 but inside the top-50, Twitter came in at 23, Salesforce.com at 25, VMware at 38 and Oracle at 39. Of the top sectors represented, technology came in third to Retail and Consumer Products (first) and Oil & Energy (second).

How did LinkedIn calculate the demand for a particular employer? It’s quite opaque, but LinkedIn says that it “analyzed over 25 billion data points between members and companies and compared the data with surveys of thousands of members to determine a company’s familiarity and engagement score.”

Very little additional detail is provided, though LinkedIn does suggest in a blog post that it discovered a high correlation between high net promoter scores (i.e., employees recommend their employer to others) and high in-demand scores. Its conclusion? To improve how “in-demand” an employer is, it should encourage LinkedIn connections. The more connections, the more it raises the company’s standing in LinkedIn’s analysis.

But Are They Happy?

While that may be a way to juice an employer’s LinkedIn “inDemand” score, it doesn’t necessarily have any bearing on how employees feel at work. In this area, Google leads Apple by a considerable margin, according to a Glassdoor analysis.

According to Glassdoor, which measures employee satisfaction with their employers, Facebook tops the list at #1, but Google isn’t far behind at #6. Apple? It sits at #34, behind Riverbed (#2), National Instruments (#8), LinkedIn (#14), Rackspace (#15), Workday (#19), Salesforce.com (#22), Citrix (#23), Intel (#31) and Red Hat (#33).

This likely isn’t a function of low pay, as Apple comes in at sixth in a separate Glassdoor survey of software engineer pay. (Google came in at #4 and Facebook is #9.)

Rather, it seems to be a matter of long work hours and correspondingly poor work/life balance, two of the top three cons listed by Apple employees. Google also gets dinged, but for different reasons. Critical employees complained about how big the company is, and the difficulty of connecting with other employees or management. Apparently these are viewed as lesser evils compared to Apple’s tough time demands.

Competition For The Best And Brightest

Again, given how central both Google and Apple are to the future of computing, it’s not surprising that both are employers in high demand. And it’s also not surprising that the stakes are high enough that people will endure a fair amount of pain to work for a market leader. Just look at Amazon, which didn’t crack Glassdoor’s top-50 employers, got a somewhat brutal write-up in Businessweek for its allegedly adversarial work environment, yet still comes in at #7 on LinkedIn’s inDemand employer survey.

However, now that Silicon Valley’s elite, including Google and Apple, can’t rely on agreements not to poach each other’s employees, odds are the best people will want to work for the companies that are not only in demand, but also respect employees need for balance. If current rankings hold, such a shift would favor Google.

Source: readwrite

AppleGooglereadwrite
Read more
  • Published in Blog, Social Media
No Comments

Subscribe to our newsletter

Recent Posts

  • Google+

    Google+ to Shut Down Following Bug That Exposed 500K Profiles

    Google said the decision makes sense given that...
  • Boost Your Online Store With These Ecommerce Hacks

    Boost Your Online Store With These Ecommerce Hacks

    Does your ecommerce store need a little jumpsta...
  • How businesses use instagram stories

    How You Can Use Instagram Stories To Your Advantage

    Social media offer a fantastic opportunity for ...
  • WooCommerce and Its Functionalities

    WooCommerce and Its Functionalities

    If you own a WordPress e-commerce website, ther...
  • Google imagines an app-less future with Android Instant Apps

    One of the biggest challenges facing developers...

Categories

  • Apps
  • Blog
  • Insights
  • Mobile
  • Networking
  • Posts
  • Social Media
  • Software
  • Technology
  • Trends

Archives

  • November 2018
  • October 2018
  • August 2018
  • March 2018
  • May 2017
  • February 2017
  • January 2017
  • October 2016
  • April 2016
  • March 2016
  • January 2016
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • March 2015
  • February 2015
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013

Recent Posts

  • Google+

    Google+ to Shut Down Following Bug That Exposed 500K Profiles

    Google said the decision makes sense given that...
  • Boost Your Online Store With These Ecommerce Hacks

    Boost Your Online Store With These Ecommerce Hacks

    Does your ecommerce store need a little jumpsta...
  • How businesses use instagram stories

    How You Can Use Instagram Stories To Your Advantage

    Social media offer a fantastic opportunity for ...
  • WooCommerce and Its Functionalities

    WooCommerce and Its Functionalities

    If you own a WordPress e-commerce website, ther...
  • Google imagines an app-less future with Android Instant Apps

    One of the biggest challenges facing developers...

Archives

  • November 2018
  • October 2018
  • August 2018
  • March 2018
  • May 2017
  • February 2017
  • January 2017
  • October 2016
  • April 2016
  • March 2016
  • January 2016
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • March 2015
  • February 2015
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013

Categories

  • Apps
  • Blog
  • Insights
  • Mobile
  • Networking
  • Posts
  • Social Media
  • Software
  • Technology
  • Trends
  • GET SOCIAL

© 2007-2019 Media Something. All rights reserved.

TOP