How Does An iCloud Hijack Work, Anyway?

Troy Hunt (of on his personal blog:

I’ve been speaking to a bunch of people about this over the last couple of days about this attack so I thought I’d collate some info on how it works, what we know and what the possible sources of the attack may be.

An excellent summary of the iCloud hijacks, how they’ve been implemented, and smart analysis of where they could have originated from.

Troy is fast becoming one of my favourite writers on the topic of online security.

For the record, Apple responded yesterday stating iCloud was not compromised during these incidents.

Reckoner had its humble beginnings way back in June of 2013.

Founded by James Croft, along with Peter Wells and Anthony Agius they created what would go on to become one of Australia’s most highly regarded and award winning independent tech blogs.

With its uniquely Australian voice Reckoner is committed to offering a “no-holds-barred” approach to its writing. Beholden to no one but its audience. Reckoner’s goal is to remain completely transparent and honour the trust it’s built with its faithful readership.

Support Reckoner!
Thanks for stopping by. It looks like you're really enjoying the content so why not help a brother out and pitch in for a coffee.

Your support makes all the difference!