The company says you will be able to use your mobile phone just like a credit card.
As IT expert and cyber security researcher Jonathan Zdziarski writes in his blog, the hackers used a commercial forensics software to "scrape each victim's i Cloud backup and other data from their accounts." To be able to do this, the hackers took advantage of a weakness in Apple's system, Zdziarski says: a hacking software was able to try out unlimited numbers of passwords without the accounts freezing automatically, after three incorrect attempts - as is the case on other platforms.
Managing your cloud But "this isn't the only security problem in a cloud," says Gaycken.
The cloud is a way of storing your photos, documents and other data on remote servers.
It "is often more secure than other storage," says Rich Mogull, CEO of security research and advisory firm Securosis, in comments to the press agency AP, adding that companies invest a lot to ensure that your private information stays private. Cloud-based storage means transferring your data to a remote location - it is not on your computer - and you effectively give control over your data to the company running the service.
And the great thing is, whether you prefer chatting extensively with your new crush first or a little fantasy in your play, there are diverse options to suit your every whim and desire.
When you need to find a hookup, like, yesterday, you should hit up one of these 19 awesome apps.
It appears the hackers were able to gain access to individual accounts simply by figuring out the passwords and answers to security questions.
Apple says their systems have not been compromised - they say this was a targeted attack on certain celebrity accounts.
It's a bit like using two padlocks on your bike, rather than just one.