• Video
  • Shop
  • Culture
  • Family
  • Wellness
  • Food
  • Living
  • Style
  • Travel
  • News
  • Book Club
  • Newsletter
  • Privacy Policy
  • Your US State Privacy Rights
  • Children's Online Privacy Policy
  • Interest-Based Ads
  • Terms of Use
  • Do Not Sell My Info
  • Contact Us
  • © 2026 ABC News
  • News

What the Celebrity Photo Hacking Teaches Us About Protecting Our Passwords

NaN:NaN
Apple Says There Was No Breach in Security in Celebrity Photo Hack
Getty Images
ByALYSSA NEWCOMB
September 02, 2014, 9:05 PM

— -- The hackers who perpetrated the privacy breach on stars including Jennifer Lawrence and Kate Upton likely had a lot of time on their hands to spend targeting the digital lives of dozens of A-listers, experts said.

Robert Siciliano, a McAfee online security expert, told ABC News the hackers could have spent "minutes, hours, days, months or years" to get inside the celebrity accounts.

"That is what these people do. That is their life," Siciliano said. "They have nothing else to do other than try and get access to a celebrity’s mobile phone, because they can."

"The icing on the cake is that she has nude pictures," he said. "That’s the holy grail."

How Hackers Targeted Celebrities' Apple Accounts

Hackers Post Alleged Naked Pics of Jennifer Lawrence and More

Does Your Digital Footprint Include Nude Photos Waiting to Be Hacked?

After a 40-hour investigation, Apple discovered the hackers used a very targeted attack on user names, passwords and security questions, according to a statement released today by the company.

The investigation found that none of the leaked photos were the result of any breach of Apple's systems, including iCloud and Find My iPhone, the company noted in its statement.

The celebrity accounts were compromised by a style of attack Apple said has become "all too common" on the Internet -- and something Siciliano said just takes a little time and persistence on the part of the hackers to crack their targets' security questions and passwords.

Many of the hackers will begin penetrating their target by zeroing in on the people around them, Siciliano said.

"They're sending emails off to you and your mom and your brother and aunt and uncle -- all to get access to your dad," he said. "They will target everyone around that person until they get access."

Sometimes that first step means finding out their target's email address, Siciliano said.

From there the hackers can use a phishing tactic to try and trick their target into clicking a link that might look like their iCloud account. If the target falls victim to the trick, all of their information, including those private photos, are now in the hacker's possession.

It could also be as simple as re-using passwords across multiple sites.

"The largest and most damaging attacks come from hackers who collect passwords and then exploit the fact that we all re-use our passwords on multiple websites," David Cowan, a cyber security expert at Bessemer Venture Partners and the co-founder of Verisign, told ABC News.

"Cyber attackers are confidently launching an attack against everybody. Think about it as more like fishing with a net than with a fishing pole," he said. "You’re more likely to get caught in the net than get tricked by the bait."

Apple recommends that users protect themselves form this type of attack by using a strong password and two-step verification -- which is offered by a variety of top cloud hosting services.

When two-step verification is set up, a user trying to log onto their account from a new device must verify their identity from a second device before they are granted access.

"It really makes sense to look globally at what are the things everyone can do," Cowan said. "There are so many vulnerabilities out there and so many ways for people to compromise our security."

Up Next in News—

King Charles III gives toast at White House state dinner: Read his full speech

April 29, 2026

This San Francisco shop is run completely by an AI agent

April 23, 2026

Mother charged after teen son allegedly hits and injures 81-year-old veteran while riding e-motorcycle

April 23, 2026

UK bill banning smoking products for those born after 2008 is one step away from becoming law

April 22, 2026

Shop GMA Favorites

ABC will receive a commission for purchases made through these links.

Sponsored Content by Taboola

The latest lifestyle and entertainment news and inspiration for how to live your best life - all from Good Morning America.
  • Contests
  • Terms of Use
  • Privacy Policy
  • Do Not Sell My Info
  • Children’s Online Privacy Policy
  • Advertise with us
  • Your US State Privacy Rights
  • Interest-Based Ads
  • About Nielsen Measurement
  • Press
  • Feedback
  • Shop FAQs
  • ABC News
  • ABC
  • All Videos
  • All Topics
  • Sitemap

© 2026 ABC News
  • Privacy Policy— 
  • Your US State Privacy Rights— 
  • Children's Online Privacy Policy— 
  • Interest-Based Ads— 
  • Terms of Use— 
  • Do Not Sell My Info— 
  • Contact Us— 

© 2026 ABC News