Categories: Security

Emily Ratajkowski the Latest Victim of iCloud Photo Hack

It seems like nearly every month another celebrity has her private photos leaked to the public. Not long ago it was Game of Thrones star Maisie William’s personal photos. Now, it’s supermodel Emily Ratajkowski. The supermodel had private photos from her personal iCloud account leaked recently. Her account was hacked, the photos were stolen, and the images were then shared with the public. How did the hack happen, why are celebrities so often have their privacy violated in this way, and how you can protect your own photos?

Here’s What You Can do to Protect Your Private Photos

With so many photo galleries hacked, it’s only reasonable to concern yourself with protecting your own photos. Private Gallery helps you to ensure that your photos are protected. All the photos you put into the Private Gallery are no longer stored in your Android Gallery or in your Whatsapp photos. Only you can open this gallery using specially chosen password. By selecting photos you want to protect and putting them into the Private Gallery, you can ensure nobody sees your most personal photos. Click here to create a Private Gallery for your more private photos:

Read More: Game of Thrones Actress Maisie Williams Topless Photos Leaked

Why Was Emily Ratajkowski a Target?

Emily Ratajkowski is an American supermodel who became famous after appearing in Robin Thicke’s “Blurred Lines” video. Hackers targeted Ratajkowski’s iCloud account, stealing around 200 of her private photos. The photos show the model scantily clad, in addition to photos from a number of different photo shoots.

Several celebrities, including Celebrity Big Brother contestant, Helen Wood, revealed the hack after she was sent the supermodel’s private photos. The photo’s sender asked Wood to include the photos in her Daily Star column. Ratajkowski didn’t hear about the hacking until she landed in Los Angeles after a flight.

Photo-Hacking is Incredibly Common, Especially for Celebrities

In 2015, hackers targeted the iCloud accounts of many Hollywood stars, leaking their private photos and videos. The event — which is called the “Fappening” by users of the image-sharing site 4Chan — made many Hollywood stars nervous about the privacy of their photos and various accounts. Jennifer Lawrence was famously involved in this wide-scale photo hack.

The hacker that orchestrated that event was caught and sentenced, but that didn’t stop new hackers from targeting Ratajkowski’s private account. Ratajkowski’s agent says that the photos leaked were those retrieved during 2015’s hack, however. While celebrities are large targets, it’s wise to remember that even people who aren’t famous can be targets.

 

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

How to identify a spy app on your smartphone

In the United States, the use of spyware apps is a growing concern, affecting mobile…

56 years ago

5 trending digital scams: how AI is making fraud more dangerous

Every day, millions of mobile phone users receive malicious links through SMS, email, or social…

56 years ago

Pix Gains Momentum Abroad: Convenience and Security for Brazilian Travelers

Travel is about new experiences — and making payments without hassle is a crucial part…

56 years ago

Malicious links: what they are and how to protect yourself

Every day, millions of  cell phone users receive malicious links via SMS, email, or social…

56 years ago

Zero Trust: what it is, why it matters, and how dfndr security protects your phone with this concept

Have you heard of Zero Trust? The term is one of the most  important trends…

56 years ago

5 Reasons to Use Biometrics to Secure Mobile Devices

Mobile devices have become essential tools in both our personal and professional lives, but they…

56 years ago