Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

App Store, Hacked. (Updated: iTunes Accounts too.)
The Next Web ^ | July 4th, 2010 | Zee

Posted on 07/04/2010 7:02:00 PM PDT by PugetSoundSoldier

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100 ... 141 next last
To: PugetSoundSoldier; dayglored; All; RachelFaith; driftdiver; for-q-clinton
It’s OK, I’ve saved Swordmaker the hassle. RachelFaith (hi sweetie!) swore up and down that Apple systems and Apple iOS and OSX were invulnerable because they’re written differently, and both Swordmaker and RachelFaith insisted that while there could be malware out there, it’s never been an issue because malware just doesn’t exist in the wild.

And THERE we see the classic example of PugetSoundSoldier Strawman LIES. Taking my truthful statement that there are no self-replicating, self-transmitting, self-installing Mac OSX virus in the wild, and generalizing it to "Malware just doesn't exist in the wild." I have, in previous THREADS on FreeRepublic, posted each and every malware candidate for OSX, including proposed proof-of-concept, only in the lab, viruses, each and every Trojan in the wild, and even Scareware, and he wonders why I call him a LIAR when he posts this tripe as factual about me!

For Puget, words don't have meanings aside from what he wants them to have. He shares this trait with most anti-Apple trolls who infest these threads.

61 posted on 07/04/2010 11:04:42 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 51 | View Replies]

To: Swordmaker; dayglored; All; RachelFaith; driftdiver; for-q-clinton
Swordmaker,

You're true to form, I'll give you that! Here's the post in question. Here's the choice statement that I vehemently disagreed with, and you and your Mac fanatics attacked me over:

So, what you are doing is pushing the LIE that such human errors in self installing a bad and unofficial app is the same as a self executing user unaware VIRUS form of Malware.

The iPhone and Mac OSX has NO SUCH VULNERABILITY. The way the code is written makes it IMPOSSIBLE to occur.

Still want to defend that statement? Still consider me a GD EVIL LIAR for calling RachelFaith out on that statement? Still want to state that iOS and OSX are written in a way that it is IMPOSSIBLE for a virus to affect them? That absolute are you?

I know RachelFaith is, since she took the biggest umbrage (and the introduction of the GD EVIL LIAR label, and an unforgivable one at that) at my refutation of that claim. Are you willing to defend it?

Of course you're the guy who also claimed that an arbitrary code execution bug wasn't a big deal because the hacker couldn't do anything with it, they could only execute "random" code...

After all, words have meanings, don't they Swordmaker? And a phrase like "arbitrary code execution" has a VERY specific meaning in computer security, and it's not what you tried to twist it to mean.

And of course, that OSX doesn't include any anti-malware processes running in it, even though it gets updated by Apple in their security patches.

And that there's no problem with the iPhone 4 antenna, it's just a bad antenna strength meter.

And there isn't a problem with the proximity sensor, it's just people having thick beards or long hair.

Or that you cannot access a non-jailbroken iPhone without iTunes, and on and on...

Carry that water for Apple, Swordmaker, carry that water!

62 posted on 07/04/2010 11:37:58 PM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 61 | View Replies]

To: All
More information here. This part is extremely troubling:

The most important thing, however, is to BUY fast not to download fast. You can download at leisure during the next weeks. iTunes will not stop you: It will only remind you that your (victim’s) credit card is not working and invite you to update your payment details.

So even if the thieves are "stopped" and cannot use your card any more, the fraudulent purchases can still be collected, weeks after the card is reported as stolen and the charges are disputed.

63 posted on 07/04/2010 11:55:07 PM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 1 | View Replies]

To: HearMe

I understand what they are. Its just a lot of work to go to when there isn’t any real risk if you monitor your account. Which you need to do anyway.

Of course if you prefer to do it that way, thats your choice.


64 posted on 07/05/2010 3:08:27 AM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 31 | View Replies]

To: BunnySlippers

Yup, another example of a macbot taking the HIGH road. Classy


65 posted on 07/05/2010 3:09:43 AM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 34 | View Replies]

To: Swordmaker

“narky made-up assumptions, like driftdivers, about “bottom lines” “

Where did I refer to bottom lines?

And how is iTunes just as susceptible to this type of problem as all the other online systems? I would assume that iTunes runs on a mac os? no? Do they run on windows?

Phishing has a very specific meaning. By using that term you are suggesting the users are at fault for their accounts being hacked. Perhaps you read a different article but I didn’t see anything indicating the users had responded to a phishing attempt and revealed their account information.

No this sounds like a hack of some type.


66 posted on 07/05/2010 3:17:46 AM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 59 | View Replies]

To: Swordmaker; PugetSoundSoldier; dayglored; All; RachelFaith; driftdiver; for-q-clinton

“words don’t have meanings aside from what he wants them to have.”

Arbitrary code execution - pot meet kettle


67 posted on 07/05/2010 3:20:03 AM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 61 | View Replies]

To: PugetSoundSoldier

Well because Microsolft, it too had to learn the HARD WAY also just as Apple is now.


68 posted on 07/05/2010 3:24:05 AM PDT by Biggirl (AZ Is DOING THE JOB The Feds Should Be Doing, ENFORCING The Southern Border! =^..^=)
[ Post Reply | Private Reply | To 56 | View Replies]

To: PugetSoundSoldier

Elmer J. FUD, at your service.

69 posted on 07/05/2010 3:26:54 AM PDT by Fresh Wind (For the first time in half a century, there is no former KKK member in the US Senate.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PugetSoundSoldier
At least I pinged Swordmaker so he can come here and tell me that I’m a liar

You are not necessarily a liar, you just want to spread your misery around, just like our President,

70 posted on 07/05/2010 6:21:26 AM PDT by itsahoot
[ Post Reply | Private Reply | To 6 | View Replies]

To: PugetSoundSoldier
what earned me the titles of GD EVIL LIAR, sinner, and vile spreader of FUD (among others), and apparently the enmity of the Mac List forever...

Your relentless effort to demean Apple users, and Apple products, for what ever vicarious pleasure you take in others misery, real or imagined, is what earned you your spot on the enemies list. Because clearly you are a enemy.

If you were posting to inform and help correct a problem it would be one thing, but you always post to belittle, never help.

You have created your own reputation.

Rachel got a little carried away, get over it, if you don't want the title, don't wear it.

71 posted on 07/05/2010 6:37:44 AM PDT by itsahoot
[ Post Reply | Private Reply | To 51 | View Replies]

To: dayglored
because prior to Mac OS-X, the earlier Mac OS was riddled with security issues. It was as bad as Windows was until XP-SP2 (in general).

And yet I have been on line since before Earthlink, and I have never had any kind of Virus, can you say the same? Remember Genie? Something like $8.00 an hour, as I recall.

72 posted on 07/05/2010 6:41:49 AM PDT by itsahoot
[ Post Reply | Private Reply | To 57 | View Replies]

To: PugetSoundSoldier
the fraudulent purchases can still be collected, weeks after the card is reported as stolen and the charges are disputed.

Maybe you should change banks, mine called me when they saw suspicious activity, I didn't have to do anything, they fixed it.

73 posted on 07/05/2010 6:52:57 AM PDT by itsahoot
[ Post Reply | Private Reply | To 63 | View Replies]

To: dayglored; Swordmaker; PugetSoundSoldier

“This has the aspect of yet another black eye for Apple, and it’s totally their own, not AT&T’s or anybody else’s baby.”

It’s possible it has something to do with an Apple oversight, but apparently no one including the author of the fairly sensationalist original article is considering that there may be no flaw whatever with Apple or iTunes.

Phishing schemes or keyloggers may be gathering iTunes username/password pairs (along with who knows what else). This “Thuat Nguyen” entity may either be directly involved with the gathering, or simply buying illegal lists of the information. If this is the case, Apple is at no fault. As soon as it was aware of the situation, it removed the offending apps, and advised users to change their password.

The bottom line is that the Internet is not without risk, especially if you’re not careful. It’s best to be proactive with everything including back accounts, credit cards, and any online accounts.


74 posted on 07/05/2010 6:55:48 AM PDT by PreciousLiberty (In theory, theory and practice are the same. In practice, they're not.)
[ Post Reply | Private Reply | To 44 | View Replies]

To: itsahoot
>> because prior to Mac OS-X, the earlier Mac OS was riddled with security issues. It was as bad as Windows was until XP-SP2 (in general).

> And yet I have been on line since before Earthlink, and I have never had any kind of Virus, can you say the same? Remember Genie? Something like $8.00 an hour, as I recall.

I sure can say the same. I've been working with personal computers since the mid-1970's, and I've been online since the late 1980's -- DEC-mail, UUCP, CompuServe, you name it. Have used Macs, PCs, Linux, and Unix computers (I prefer Unix for its robustness, but all have their strong and weak points).

There will always be careful people like ourselves, and others who catch stuff left and right. The average does not predict the individual.

75 posted on 07/05/2010 7:03:19 AM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 72 | View Replies]

To: PreciousLiberty
Phishing schemes or keyloggers may be gathering iTunes username/password pairs (along with who knows what else). This “Thuat Nguyen” entity may either be directly involved with the gathering, or simply buying illegal lists of the information. If this is the case, Apple is at no fault. As soon as it was aware of the situation, it removed the offending apps, and advised users to change their password.

It's also possible that the information was obtained illegally from someone at Apple, or one of it's contractors. There appears to be a lot of unknowns right now.

76 posted on 07/05/2010 7:10:41 AM PDT by tacticalogic ("Oh bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 74 | View Replies]

To: PreciousLiberty; Swordmaker; PugetSoundSoldier
> It’s possible it has something to do with an Apple oversight, but apparently no one including the author of the fairly sensationalist original article is considering that there may be no flaw whatever with Apple or iTunes. Phishing schemes or keyloggers may be gathering iTunes username/password pairs (along with who knows what else). This “Thuat Nguyen” entity may either be directly involved with the gathering, or simply buying illegal lists of the information. If this is the case, Apple is at no fault. As soon as it was aware of the situation, it removed the offending apps, and advised users to change their password. The bottom line is that the Internet is not without risk, especially if you’re not careful. It’s best to be proactive with everything including back accounts, credit cards, and any online accounts.

Apple has yet to issue a statement indicating whether this problem was:

  1. A phishing attack separate from Apple's services, in which the stolen identities were applied to an Apple service, or...

  2. A direct attack on Apple's services, in which the identities were stolen from Apple's databases.
Until Apple issues such a statement, we're all just speculating, and I would neither condemn nor exonerate Apple based on such speculation.

Sensationalist tech writers live for the day they can write a headline suggesting that Apple's vaunted security has been breached -- whether it has or not. Of course the headline will be written in such a way. So what? You're going to act shocked or surprised that tech writers are attention whores?

Write a note to Apple and encourage them to make a public statement to clear this up.

77 posted on 07/05/2010 7:11:34 AM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 74 | View Replies]

To: PugetSoundSoldier
"This part is extremely troubling:
The most important thing, however, is to BUY fast not to download fast. You can download at leisure during the next weeks. iTunes will not stop you: It will only remind you that your (victim’s) credit card is not working and invite you to update your payment details.

Not so much - who cares about when the product is downloaded? The transaction has already occurred (money gone).

However, these two quotes from the same article are interesting. This first one actually makes little sense:

"Then, if you want more applications later on, you just enter in Taobao.com and get again a new account in a few minutes. This is the sad reality. There are a lot of of things Apple could do to stop this, like canceling the hijacked accounts and de-authorizing its computers, making the whole process useless.
Exactly how is Apple to know the account was "highjacked"? I guess the author of this article is under the impression that Jobs & Co are omniscient.

The one constructive suggestion that comes to mind would be to do a second round of authentication when account information is changed from a different country than that in which the account was registered. It should be noted, though, that changing the login info isn't really required.

This next quote is spot on, however:

But for what? This is not a problem for Apple: It is a problem for the credit card industry. The account is right, the payment is right, end of the story. If you claim that someone used your credit card to buy things it is a problem between you and your bank, not between you and Apple!
This is the core issue. Apple security hasn't been hacked, it is end user computers. What the thieves purchased with their illegally obtained information is rather irrelevant.

But of course it's fun to bash Apple, and it generates a lot of page views...

78 posted on 07/05/2010 7:14:56 AM PDT by PreciousLiberty (In theory, theory and practice are the same. In practice, they're not.)
[ Post Reply | Private Reply | To 63 | View Replies]

To: Keith in Iowa

“Broken clocks are occasionally right and blind squirrels stumble upon nuts.”

Actually, the squirrels smell the rotting acorns and dig them up. They prefer year-old rotting nuts to fresh. A blind squirrel would have no problem finding nuts.


79 posted on 07/05/2010 7:22:31 AM PDT by Poser (Enjoying tasty animals for 58 years)
[ Post Reply | Private Reply | To 43 | View Replies]

To: dayglored
There will always be careful people like ourselves

The point is I am not careful, I run out of the box OS, and use no third party protection at all. I do however reject offers to get free anything.

80 posted on 07/05/2010 8:25:09 AM PDT by itsahoot
[ Post Reply | Private Reply | To 75 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100 ... 141 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson