“Unauthorized users appear to have accessed Hillary Clinton Campaign Chairman John Podesta’s various accounts after an email containing his Apple ID and password was found within the recent WikiLeaks email release,” Charlie Nash reports for Breitbart.
“One user is alleged to have remotely erased Podesta’s iPhone after accessing his Apple account, which contained Podesta’s phone number, address, and various email accounts,” Nash reports. “Another user tagged WikiLeaks editor Julian Assange in a Twitter post along with various screenshots of Podesta’s Apple account and the comment: ‘“You are going to be getting some interesting information shortly.'”
“WikiLeaks have released numerous batches of emails sent from and to Podesta,” Nash reports, “and the leaked emails have since revealed the Clinton Campaign’s coziness to mainstream media reporters, distaste for Catholics, disregard for shootings that could not further their gun control agenda, and Podesta’s very own obsession with extraterrestrials.”
Read more in the full article here.
MacDailyNews Take: Once again, too many people use one password for multiple services and weak passwords at that. Once hackers get it or guess it, they then have access to all sorts of things: cloud storage, bank accounts, Facebook, Twitter, email, etc.
You want to use unique, strong passwords. Use two-step verification for Apple ID to keep your personal information as secure as possible. More info here.
7 password experts explain how to lock down your online security – May 5, 2016
Why a strong password doesn’t help as much as a unique one – July 22, 2015
Major zero-day security flaws in both iOS and OS X allow theft of Keychain, app passwords – June 17, 2015
Many passwords are so bad they don’t even need to be hacked – January 20, 2015
The secret life of passwords – November 22, 2014
Apple’s iCloud is secure; weak passwords and gullible users are not – September 2, 2014