All the latest UK technology news, reviews and analysis


Hacked Apple IDs came from us, admits mobile publisher

11 Sep 2012
Security threats - password theft

Small mobile publishing firm BlueToad has reported that they were the group that was hacked last week.

BlueToad's admission ends the week-long question of where 12 million Apple ID's published online came from. Hacktivists had previously claimed the ID's came from the FBI. However, FBI officials denied having such data from the start.

In a statement posted on the BlueToad's website, chief executive Paul Dehart apologised for the well-publicised hack.

"We sincerely apologise to our partners, clients, publishers, employees and users of our apps," Dehart said in his statement.

"We take information security very seriously and have great respect and appreciation for the public's concern surrounding app and information privacy."

Hacktivist group Anonymous released 12 million unique device identifiers (UDID's) online last week. The group claimed the codes came from an FBI laptop they successfully hacked. FBI officials eventually countered the claims calling them "totally false".

BlueToad's chief executive explained the type of information his company was handling and reiterated that nothing it collected went against government standards.

"BlueToad does not collect, nor have we ever collected, highly-sensitive personal information like credit cards, social security numbers or medical information," Dehart continued.

"The illegally obtained information primarily consisted of Apple device names and UDIDs - information that was reported and stored pursuant to commercial industry development practices."

UDID's are found on Apple iOS devices. They contain information like user names, device names, zip codes, the device type, and the mobile's number.

Dehart reassured the public that his firm believes the information that was leaked had a very low risk of hurting users.

"We understand and respect the privacy concerns surrounding the data that was stolen from our system. BlueToad believes the risk that the stolen data can be used to harm app users is very low," Dehart said.

"But that certainly doesn't lessen our resolve to ensure that all data is protected and kept from those who seek to illegally obtain it."

Hacking has become very prominent in 2012. Sony Mobile was recently hacked by hacktivists looking to prove the poor security standards of the company.

Anonymous hackers also shut down Swedish government websites early last week in sign of solidarity for Wikileaks founder Julian Assange.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
James Dohnert
About

James is a freelance writer and editor. In addition to ClickZ, his work has appeared in publications like V3, The Commonwealth Club, CachedTech.com, and Shonen Jump magazine. He studied Journalism at Weber State University.

More on Government
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
20%
13%
4%
20%
31%
12%

Popular Threads

Powered by Disqus
Galaxy S5 vs Xperia Z2 home screen

Xperia Z2 vs Galaxy S5

We break down the strengths and weaknesses of the two Android heavyweights

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

IT Consultant/Monitoring Analyst (HPOM, OML, OMU, Sitescope)

We are currently urgently seeking an experienced IT Consultant...

SHAREPOINT DEVELOPER

REQUIRED: SHAREPOINT DEVELOPER LOCATION: READING DURATION...

Oracle Developer PL/SQL ORM - Finance Software

Oracle Developer / Oracle Database Developer (PL/SQL...

Digital Investigations Specialist - London - £60-£65k

My client is a leader in providing digital forensics...
To send to more than one email address, simply separate each address with a comma.