07-08-2010, 02:29 AM | #46 |
Groupie
Posts: 190
Karma: 1248
Join Date: Nov 2009
Location: Milton Keynes UK
Device: Sony PRS-600 Touch, iPhone
|
[QUOTE=Fotoman;997931]And I suppose you're going to be sharing the statistics that prove just how low selling that part of the store is with us...in all countries, since accounts are country-specific.
Umm... if you could be bothered to go to the websites of the developers who first reported this (as I did) and read their own notes on volumes of sales and how much change in volume is required to cause a shift in ranking (as I did) you would get the evidence that supports the contention that it's perfectly possible for 400 hacks to make a difference because these are in a low volume category. [QUOTE=Fotoman;997931]I'll need to see the numbersn before I'll believe that 400 hacks was is enough to affect several countries' iTune stores in the manner they were affected. Until I see that, I prefer the theory that this is just spin for damage control. Fine - you can see them - by doing what I did and researching this properly instead of sitting on the sidelines telling everyone else that you reject their research from your position of lofty ignorance |
07-08-2010, 02:39 AM | #47 | |
Groupie
Posts: 190
Karma: 1248
Join Date: Nov 2009
Location: Milton Keynes UK
Device: Sony PRS-600 Touch, iPhone
|
Quote:
The other point is that the App Store doesn't pay out immediately so, in cases like the ones we're discussing, there's a distinct probability that the perps won't actually get the money. I suppose that if I'd got hold of credit card details that I could use anywhere, I'd use them somewhere where I get the benefit immediately, rather than somewhere where I might never see my ill-gotten gains. On the balance of probability, this looks like someone got hold of iTunes logins rather than card details Last edited by nick101; 07-08-2010 at 03:06 AM. |
|
Advert | |
|
07-08-2010, 04:53 AM | #48 | |
Interested Bystander
Posts: 3,725
Karma: 19728152
Join Date: Jun 2008
Device: Note 4, Kobo One
|
Quote:
That is an assumption being presented as fact. Why don't the same rules apply to you? |
|
07-08-2010, 04:59 AM | #49 | ||
Interested Bystander
Posts: 3,725
Karma: 19728152
Join Date: Jun 2008
Device: Note 4, Kobo One
|
Quote:
b) If someone had actually hacked into the iTunes store servers and retrieved credit card details, why is this such a small level of theft? There are millions of iTunes accounts. |
||
07-08-2010, 05:03 AM | #50 |
Grand Sorcerer
Posts: 7,452
Karma: 7185064
Join Date: Oct 2007
Location: Linköpng, Sweden
Device: Kindle Voyage, Nexus 5, Kindle PW
|
For what I know that is totally wrong. Connect a computer without security updates to the net and you only have to wait a couple of minutes for the attacks to start and probably succeed.
|
Advert | |
|
07-08-2010, 05:12 AM | #51 |
Interested Bystander
Posts: 3,725
Karma: 19728152
Join Date: Jun 2008
Device: Note 4, Kobo One
|
It is being posited that the iTunes store itself has been hacked, and that is where the account details have been taken from. I don't think it is hosted on desktops with no security updates applied
|
07-08-2010, 05:16 AM | #52 |
Grand Sorcerer
Posts: 7,452
Karma: 7185064
Join Date: Oct 2007
Location: Linköpng, Sweden
Device: Kindle Voyage, Nexus 5, Kindle PW
|
Sure. But HarryT's argument was a general one about the number of successful attacks.
|
07-08-2010, 05:22 AM | #53 |
eBook Enthusiast
Posts: 85,544
Karma: 93383043
Join Date: Nov 2006
Location: UK
Device: Kindle Oasis 2, iPad Pro 10.5", iPhone 6
|
No, you have misinterpreted what I said. I was saying that, in cases where banks, e-commerce sites, etc, are "hacked", it's generally done by social engineering rather than technical means. ie the sites' security systems are not broken; logon credential are obtained by other means - phishing, fake phone calls, or whatever.
|
07-08-2010, 06:59 AM | #54 | |
Groupie
Posts: 190
Karma: 1248
Join Date: Nov 2009
Location: Milton Keynes UK
Device: Sony PRS-600 Touch, iPhone
|
Quote:
A fundamental weakness of many supposedly secure setups is that they are predicated o the idea that login is controlled and, if you can engineer your way into the system, the door's pretty much wide open. The second commonest cause of breaches is the copying of data from a secure system to somewhere insecure. Classic examples are the unencrypted USB stick and people copying files to work on on their home, insecure computer. There are hack into systems, and some of them have massive ramifications - but there aren't that many. |
|
07-08-2010, 10:59 AM | #55 | |
Groupie
Posts: 157
Karma: 2160
Join Date: Feb 2009
Location: Vancouver, BC
Device: iPad 64GB wifi (Sony 505 RIP)
|
Quote:
|
|
07-08-2010, 11:11 AM | #56 | |
Groupie
Posts: 157
Karma: 2160
Join Date: Feb 2009
Location: Vancouver, BC
Device: iPad 64GB wifi (Sony 505 RIP)
|
Quote:
Also... I'm not sure what part of "...I prefer the theory that..." you're having problems understanding. |
|
07-08-2010, 12:53 PM | #57 |
Groupie
Posts: 190
Karma: 1248
Join Date: Nov 2009
Location: Milton Keynes UK
Device: Sony PRS-600 Touch, iPhone
|
I have, as have various other people - you could go to the app store, or you could go to the developers' sites or you could go to the TNW article whose link I posted earlier. I've done better than that - I've gone there for you and I've summarised the information to save you the effort
|
07-08-2010, 01:20 PM | #58 | ||
Groupie
Posts: 157
Karma: 2160
Join Date: Feb 2009
Location: Vancouver, BC
Device: iPad 64GB wifi (Sony 505 RIP)
|
Quote:
http://thenextweb.com/apple/2010/07/...e-hack-itunes/ Quote:
I see no data nor calculations there that in any way explains how 400 accounts had this much impact on the iTunes stores in several countries. All I have seen is speculation by some that 400 could have done it... which one of your sources doesn't even believe Unless you can show me the data and calculatons that make sense, I'll have to conclude that you're just speculating like everyone else with the exception that you're are puffing up your own speculations by claiming it's derived from alledged thorough research based on data only you seem privy to. |
||
07-08-2010, 10:26 PM | #59 | ||
.
Posts: 3,408
Karma: 5647231
Join Date: Oct 2008
Device: never enough
|
Well, we still don't know for sure (and may never know), but F-Secure did weigh in on the issue:
http://www.computerworld.com/s/artic...ecurity_expert Quote:
Quote:
|
||
07-09-2010, 04:33 AM | #60 | |
Groupie
Posts: 190
Karma: 1248
Join Date: Nov 2009
Location: Milton Keynes UK
Device: Sony PRS-600 Touch, iPhone
|
Quote:
Whatever |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Massive hacking of iTunes accounts happening right now! | vaughnmr | News | 64 | 07-08-2010 08:50 PM |
1st time owner - Advice on personalizing, improving, hacking? | Jonahcz | Sony Reader | 7 | 05-14-2008 10:50 PM |