Apple Says There Was No Breach in Security in Celebrity Photo Hack

Forensic investigator says there are deep underground networks of hackers profiting from photos of celebrities.
1:54 | 09/02/14

Coming up in the next {{countdown}} {{countdownlbl}}

Coming up next:

{{nextVideo.title}}

{{nextVideo.description}}

Skip to this video now

Now Playing:

{{currentVideo.title}}

More information on this video
Enhanced full screen
Explore related content
Comments
Related Extras
Related Videos
Video Transcript
Transcript for Apple Says There Was No Breach in Security in Celebrity Photo Hack
We're going to turn to the breaking headline late today over famous faces and their private photographs hacked. Actress Jennifer Lawrence, Kate Upton, their personal photos posted online. We're learning about how this happened and we ask here how safe are your photos and the one thing you can do right now. ABC's chief business correspondent Rebecca Jarvis tonight. Reporter: Tonight apple saying there was no breach in any of their systems, including cloud. Instead, apple discovered a very targeted attack on certain celebrity accounts of their user names, passwords and security questions. What's your mother's maiden name, what's the name of your first pet? When you're talking about a celebrity you could probably get all this information from their wikipedia page. Reporter: Forensic hacking investigator Vinny Troia says there are deep underground networks of hackers all over the internet profiting from the trade and sale of photos like the ones involved in this breach. It's almost like they have contests to see who can outdo each other. Reporter: But the leak is also exposing just how vulnerable out bersonal information and pictures are on the internet. The solution lies in those passwords, the bane of our existence. They are the gatekeepers to our privacy. Security experts say we must make them unique and change them often because a photo in the wrong hands can cause something much worse than embarrassment. It can even put you in danger. You can tell the latitude, the longitude and the altitude of where she was the moment it took that photo. Reporter: With all that information out there, the single most effective thing you can do to protect your information online, don't just use a password. Many websites now offer two-step verification. You want to choose that option. You will get an added layer of protection, David. Rebecca, thank you. We're going to turn now to

This transcript has been automatically generated and may not be 100% accurate.

{"id":25222884,"title":"Apple Says There Was No Breach in Security in Celebrity Photo Hack","duration":"1:54","description":"Forensic investigator says there are deep underground networks of hackers profiting from photos of celebrities.","section":"WNT","mediaType":"Default"}