{"id":2311,"date":"2010-07-09T07:00:15","date_gmt":"2010-07-09T15:00:15","guid":{"rendered":"https:\/\/www.zubairalexander.com\/stage\/?p=2311"},"modified":"2019-02-13T14:28:54","modified_gmt":"2019-02-13T21:28:54","slug":"more-apple-att-security-breaches","status":"publish","type":"post","link":"https:\/\/www.zubairalexander.com\/blog\/more-apple-att-security-breaches\/","title":{"rendered":"Apple &#038; AT&#038;T Security Breaches&#8230;..Again!"},"content":{"rendered":"<p>I recently read an article by MVP Susan Bradley titled <em>iTunes account theft strikes close to home.<\/em>\u00a0In her article Susan explained how someone used her credit card to make a purchase and Apple offered no help tracking down the perpetrators.<\/p>\n<blockquote><p>&#8220;My next stop was Apple&#8217;s iTunes customer service, where I explained the situation and asked what had happened to my account. And that&#8217;s when the <em><strong>fun <\/strong><\/em>began.<\/p>\n<p>Exactly how did someone gain access to my account? The e-mail I eventually received from Apple offered no explanation \u2014 just a recommendation that I change my password and contact my bank to remove the charges.&#8221;<\/p><\/blockquote>\n<p>Obviously, Susan did a little research and here&#8217;s what she found:<\/p>\n<blockquote><p>&#8220;I researched the Web and quickly discovered I wasn&#8217;t alone. About a year ago, blogger Gary LaPointe suffered a similar fate. In late May 2010, others added similar experiences to his <a href=\"http:\/\/garysaid.com\/is-my-apple-itunes-account-hacked\/\">post<\/a>. More reports also showed up in Mac forums and in a Facebook <a href=\"http:\/\/www.facebook.com\/group.php?gid=115931615089725&amp;v=wall\">page<\/a> devoted to iTunes issues. The problem spread as far as Japan, where a news story discussed local iTunes identity thieves.<\/p>\n<p>Since May, there&#8217;s been more bad news for Apple. In a highly publicized incident, AT&amp;T came under fire for a security breach affecting iPad 3G users. Hackers found a vulnerability in AT&amp;T&#8217;s customer database and used it to harvest e-mail addresses. With that information, they then posted a list of notable iPad 3G users such as Diane Sawyer and my sister. AT&amp;T sent apology e-mails to everyone who owned an iPad with 3G Internet access.&#8221;<\/p><\/blockquote>\n<p>Both Apple and AT&amp;T&#8217;s reputation has been tarnished by several security breaches lately.<\/p>\n<blockquote><p>&#8220;Apple&#8217;s woes didn&#8217;t stop there. On opening day for preorders for the iPhone 4, allegations by several tech sites \u2014 including a Gizmodo story \u2014 charged that the AT&amp;T preorder site had inadvertently shared personal information among site users.&#8221;<\/p><\/blockquote>\n<p>Although AT&amp;T has been responsible for some of these security breaches, Apple is automatically affected by these stories, especially after <a href=\"https:\/\/www.zubairalexander.com\/blog\/more-apple-att-security-breaches\/\">Apple admitted in an open letter<\/a> that the signal bars on iPhones were essentially fake.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I recently read an article by MVP Susan Bradley titled iTunes account theft strikes close to home.\u00a0In her article Susan explained how someone used her credit card to make a purchase and Apple offered no help tracking down the perpetrators. &#8220;My next stop was Apple&#8217;s iTunes customer service, where I explained the situation and asked [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[9,7,24],"tags":[],"class_list":["post-2311","post","type-post","status-publish","format-standard","hentry","category-applemcintosh","category-news","category-security"],"aioseo_notices":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts\/2311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/comments?post=2311"}],"version-history":[{"count":0,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts\/2311\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/media?parent=2311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/categories?post=2311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/tags?post=2311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}