iCloud is not safe again. New tool surpasses the limit again

iCloud is not safe again. New tool surpasses the limit again

Although Apple has stepped up password security after the iCloud nude photo scandal and claimed to have fixed the password attempt limit vulnerability, the latest source code uploaded to GitHub shows that a tool seems to have discovered a new vulnerability that can bypass this protection again to brute-force Apple ID. The tool is called iDICT, and its attack principle is nothing more than a simple brute-force method, that is, using a dictionary containing 500 passwords to crack any iCloud account, and these 500 attempts can successfully pass Apple's limit monitoring. This means that if the dictionary happens to contain a password that matches the target account, iCloud will be cracked.

Obviously, the current success rate of this tool is negligible, but don't forget that hackers can generate more complex and larger password dictionaries, so there is still a certain probability that this vulnerability will threaten the security of iCloud accounts again.

With the previous experience, I believe Apple will fix this vulnerability soon. But for now, just in case, users are better off increasing the complexity of their iCloud passwords.

Link to this article: http://www.cocoachina.com/apple/20150104/10820.html

<<:  Three ways to input wearable devices

>>:  The rise of Asian power at CES has Americans worried

Recommend

E-commerce operation full-year marketing activity plan layout

This sharing session is divided into three parts:...

Improve product conversion rate and manage "user value" well

If you want to increase product sales, conversion...

The misunderstood growth of the Internet

The management of many companies may have this pe...

The Essential Guide to App Store ASO: 3 Steps to ASO Optimization

ASO provides free, high-quality users to your And...

APP application market distribution and launch strategy!

Currently, App distribution and delivery is an in...