• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

High Profile Data Breaches Bring Digital Security to Forefront

While the rest of us were at the beach or enjoying a picnic over the long holiday weekend, a band of unsavory hackers were hard at work flooding the Internet with a wealth of stolen data.

On Sunday, a massive collection of personal photos alleged to have been swiped from the iCloud accounts of a wide range of celebrities including Jennifer Lawrence and Kate Upton appeared online.

How exactly did hackers manage to get their hands on these images? Well, as of now you’d have better luck trying to get a consensus about what the real purpose is of Area 51. The web is bursting with theories about how the attack went down, but so far little has been confirmed.

Some of the more popular theories include:

  • Log-in credential phishing scams
  • Guessing password reset questions based on publically available info, and
  • Nabbing celebrities’ iCloud passwords and usernames by breaking into a public WiFi system at the Emmy Awards.

Initially, everyone lined up behind reports that hackers used a “brute force attack” to exploit a vulnerability in Apple’s Find My iPhone app. This tactic involves using a tool to guess random passwords over and over until hitting on the right one. Until a patch was quietly issued on Monday morning, Find My iPhone was susceptible to this as it didn’t lock out users after a predetermined number of failed log-in attempts.

However, Apple has come out and done its best to debunk that theory and restore confidence in the security of its iCloud service. Following two days of investigating, the tech giant released a statement which said “Certain celebrity accounts were compromised by a very targeted attack on user names, passwords, and security questions …”

Apple added that: “None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud or Find my iPhone.”

Then on Tuesday, average Joes became the target. Black market websites began posting what they claimed was customer credit and debit card info stolen from Home Depot. As soon as word got out, Home Depot announced it was investigating the potential breach of its point of sale systems.

The prevailing theory at the moment is that the Home Depot breach may have first occurred way back in May of this year. If that’s proven to be the case, that could put this attack on an even bigger scale than the much publicized Target theft which ran from November through December of last year.

As a result of the Target attack, hackers were able to make off with the credit or debit card information of about 40 million customers and personal information, like email and mailing addresses, from about 70 million.

It’s still too early to say exactly what went wrong in either of these break-ins.

If, when the dust settles on the Apple situation, it does turn out that some type of phishing scam is to blame for the attack, it likely won’t come as too much of a surprise to IT pros. Phishing has proven to be one of the most effective, and as a result most popular, cons that hackers have in their arsenal.

This case in particular could make an excellent jumping off point for a conversation between your security team and front end users about the latest schemes hackers are deploying, what to watch for and the steps they can take to protect themselves and your organization’s data.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}