All the latest UK technology news, reviews and analysis


Hacked Apple IDs came from us, admits mobile publisher

11 Sep 2012
Security threats - password theft

Small mobile publishing firm BlueToad has reported that they were the group that was hacked last week.

BlueToad's admission ends the week-long question of where 12 million Apple ID's published online came from. Hacktivists had previously claimed the ID's came from the FBI. However, FBI officials denied having such data from the start.

In a statement posted on the BlueToad's website, chief executive Paul Dehart apologised for the well-publicised hack.

"We sincerely apologise to our partners, clients, publishers, employees and users of our apps," Dehart said in his statement.

"We take information security very seriously and have great respect and appreciation for the public's concern surrounding app and information privacy."

Hacktivist group Anonymous released 12 million unique device identifiers (UDID's) online last week. The group claimed the codes came from an FBI laptop they successfully hacked. FBI officials eventually countered the claims calling them "totally false".

BlueToad's chief executive explained the type of information his company was handling and reiterated that nothing it collected went against government standards.

"BlueToad does not collect, nor have we ever collected, highly-sensitive personal information like credit cards, social security numbers or medical information," Dehart continued.

"The illegally obtained information primarily consisted of Apple device names and UDIDs - information that was reported and stored pursuant to commercial industry development practices."

UDID's are found on Apple iOS devices. They contain information like user names, device names, zip codes, the device type, and the mobile's number.

Dehart reassured the public that his firm believes the information that was leaked had a very low risk of hurting users.

"We understand and respect the privacy concerns surrounding the data that was stolen from our system. BlueToad believes the risk that the stolen data can be used to harm app users is very low," Dehart said.

"But that certainly doesn't lessen our resolve to ensure that all data is protected and kept from those who seek to illegally obtain it."

Hacking has become very prominent in 2012. Sony Mobile was recently hacked by hacktivists looking to prove the poor security standards of the company.

Anonymous hackers also shut down Swedish government websites early last week in sign of solidarity for Wikileaks founder Julian Assange.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
James Dohnert
About

James is a freelance writer and editor. In addition to ClickZ, his work has appeared in publications like V3, The Commonwealth Club, CachedTech.com, and Shonen Jump magazine. He studied Journalism at Weber State University.

More on Government
What do you think?
blog comments powered by Disqus
Poll

Windows 7 end of mainstream support

What are your plans for when Microsoft ends mainstream support for Windows 7 in January 2015?
10%
9%
3%
64%
14%

Popular Threads

Powered by Disqus
LG G3 in gold black and white

LG G3 vs Galaxy S5 video

We pit the two Korean firms' flagship smartphones against each other

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv3may

Getting started with virtualisation

Virtualisation can help you reduce costs, improve application availability, and simplify IT
management. However, getting started can be challenging

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

Software Security Sales - Cyber/eDiscovery/Forensics - Public sector

Smashin' role coming up for a Senior Sales Executive...

Digital Marketing / Retail "Apps" - Sales Person

Our client is a leading name in the ecommerce and retailing...

Product Marketing Manager - BI/Predictive Analytics

Analytics and Big Data software are what are changing...

CHECK Team Leader

Our client is an award winning provider of Cyber Security...
To send to more than one email address, simply separate each address with a comma.