Skip to main content
Tom's Guide Tom's Guide
flag of Australia
Australia
flag of UK
UK
flag of US
US
flag of Canada
Canada
Newsletters Newsletter
RSS
Sign in
  • View Profile
  • Sign out
You May Like
  • A person typing on a laptop with warning messages displayed on screen Macs under attack from ‘cracked’ apps spreading dangerous info-stealing malware — don’t fall for this
  • Split images of Apple, Google and Facebook logos 16 billion password data breach hits Apple, Google, Facebook and more — LIVE updates and how to stay safe
  • Hands on a laptop with a warning exclamation point Almost 900,000 students and alumni hit in major college data breach — financial-aid info, Social Security numbers and more exposed
  • Phones
    • Phone Insights
      • Phone Best Picks
      • Phone Deals
      • Phone Face-Offs
      • Phone How-Tos
      • Phone News
      • Phone Reviews
    • Network Carriers
      • AT&T
      • T-Mobile
      • Verizon
    • Android Phones
      • Google Phones
      • Motorola Phones
      • OnePlus Phones
      • Samsung Phones
      • Nothing Phone
    • iPhone
    • Apps
    • TVs
      • TV Best Picks
      • TV Deals
      • TV Face-Offs
      • TV How-Tos
      • TV News
      • TV Reviews
      • OLED TVs
      • QLED TVs
    • Audio Insights
      • Audio Best Picks
      • Audio Deals
      • Audio Face-Offs
      • Audio How-Tos
      • Audio News
      • Audio Reviews
    • Headphones
      • AirPods
      • Earbuds
      • Over-Ear Headphones
    • Speakers
      • Bluetooth Speakers
      • Smart Speakers
      • Soundbars
    • TV & Audio Brands
      • Beats
      • Bose
      • Hisense
      • JBL
      • LG
      • Roku
      • Sonos
      • Spotify
      • TCL
  • Entertainment
    • Streaming
      • Streaming Devices
      • Netflix
      • Prime Video
      • Disney+
      • HBO Max
      • Hulu
      • Apple TV+
      • Paramount Plus
      • Peacock
    • Gaming
      • Nintendo
      • PlayStation
      • Xbox
      • Handheld Gaming
      • PC Gaming
      • Gaming Peripherals
      • Alienware
      • Corsair
      • Razer
      • Steam
    • Word Games
      • Wordle
      • Connections
      • Strands
  • Computing
    • Computing Insights
      • Computing Best Picks
      • Computing Deals
      • Computing Face-Offs
      • Computing How-Tos
      • Computing News
      • Computing Reviews
    • VPN
      • VPN Best Picks
      • VPN Deals
      • VPN Face-Offs
      • VPN How-Tos
      • VPN News
      • VPN Reviews
    • Hardware
      • CPUs
      • GPUs
      • Monitors
      • Printers
      • Routers
      • Mice
      • Keyboards
    • Software
      • Operating Systems
      • Windows
      • macOS
    • Security
      • Antivirus
      • Identity Theft Protection
      • Parental Controls
      • Malware & Adware
    • VR & AR
      • Virtual Reality
      • Augmented Reality
      • Smart Glasses
      • Meta Quest
    • Laptops
      • Chromebooks
      • Gaming Laptops
      • MacBooks
    • Desktops
      • Apple Desktops
      • Gaming Desktops
      • Mini PCs
    • Tablets
      • iPads
      • Android Tablets
      • e-Readers
    • Computing Brands
      • Acer
      • Asus
      • Dell
      • HP
      • Lenovo
      • Intel
      • AMD
      • Nvidia
  • AI
    • AI Insights
      • AI Best Picks
      • AI Deals
      • AI Face-Offs
      • AI How-Tos
      • AI News
      • AI Reviews
    • AI Engines
      • ChatGPT
      • Copilot
      • Google Gemini
      • Apple Intelligence
      • Claude
      • DeepSeek
      • Perplexity
      • Grok
  • Wellness
    • Mattresses
      • Mattress Best Picks
      • Mattress Deals
      • Mattress Face-Offs
      • Mattress How-Tos
      • Mattress News
      • Mattress Reviews
      • Mattress Care
      • Mattress Toppers
      • Pillows & Bedding
    • Fitness
      • Workouts
      • Smartwatches
      • Fitness Trackers
      • Smart Rings
      • Running
      • Apple Watch
      • Garmin
      • Oura
      • Adidas
      • Nike
    • Sleep
      • Sleep Tips
      • Sleep Tech
  • Home
    • Home Insights
      • Home Best Picks
      • Home Deals
      • Home Face-Offs
      • Home How-Tos
      • Home News
      • Home Reviews
    • Home Topics
      • Home Appliances
      • Home Office
      • Home Security
      • Smart Home
    • Outdoors
      • Gardening
      • Lawn Care
    • Home Brands
      • Ninja
      • Shark
      • Dyson
      • KitchenAid
      • Ring
      • Breville
    • By Type
      • Best Picks
      • Deals
      • Face-Offs
      • How-Tos
      • News
      • Reviews
      • Coupons
      • Newsletter
    • Popular Brands
      • Amazon
      • Apple
      • Samsung
      • Microsoft
      • Google
      • Sony
      • Meta
      • OpenAI
Forums
  • home
  • Phones
    • View Phones
      • Phone Best Picks
      • Phone Deals
      • Phone Face-Offs
      • Phone How-Tos
      • Phone News
      • Phone Reviews
    • Network Carriers
      • View Network Carriers
      • AT&T
      • T-Mobile
      • Verizon
    • Android Phones
      • View Android Phones
      • Google Phones
      • Motorola Phones
      • OnePlus Phones
      • Samsung Phones
      • Nothing Phone
    • iPhone
    • Apps
    • TVs
      • View TVs
      • TV Best Picks
      • TV Deals
      • TV Face-Offs
      • TV How-Tos
      • TV News
      • TV Reviews
      • OLED TVs
      • QLED TVs
    • Audio Insights
      • View Audio Insights
      • Audio Best Picks
      • Audio Deals
      • Audio Face-Offs
      • Audio How-Tos
      • Audio News
      • Audio Reviews
    • Headphones
      • View Headphones
      • AirPods
      • Earbuds
      • Over-Ear Headphones
    • Speakers
      • View Speakers
      • Bluetooth Speakers
      • Smart Speakers
      • Soundbars
      • Beats
      • Bose
      • Hisense
      • JBL
      • LG
      • Roku
      • Sonos
      • Spotify
      • TCL
  • Entertainment
    • View Entertainment
    • Streaming
      • View Streaming
      • Streaming Devices
      • Netflix
      • Prime Video
      • Disney+
      • HBO Max
      • Hulu
      • Apple TV+
      • Paramount Plus
      • Peacock
    • Gaming
      • View Gaming
      • Nintendo
      • PlayStation
      • Xbox
      • Handheld Gaming
      • PC Gaming
      • Gaming Peripherals
      • Alienware
      • Corsair
      • Razer
      • Steam
      • Wordle
      • Connections
      • Strands
  • Computing
    • View Computing
      • Computing Best Picks
      • Computing Deals
      • Computing Face-Offs
      • Computing How-Tos
      • Computing News
      • Computing Reviews
    • VPN
      • View VPN
      • VPN Best Picks
      • VPN Deals
      • VPN Face-Offs
      • VPN How-Tos
      • VPN News
      • VPN Reviews
    • Hardware
      • View Hardware
      • CPUs
      • GPUs
      • Monitors
      • Printers
      • Routers
      • Mice
      • Keyboards
    • Software
      • View Software
      • Operating Systems
      • Windows
      • macOS
    • Security
      • View Security
      • Antivirus
      • Identity Theft Protection
      • Parental Controls
      • Malware & Adware
    • VR & AR
      • View VR & AR
      • Virtual Reality
      • Augmented Reality
      • Smart Glasses
      • Meta Quest
    • Laptops
      • View Laptops
      • Chromebooks
      • Gaming Laptops
      • MacBooks
    • Desktops
      • View Desktops
      • Apple Desktops
      • Gaming Desktops
      • Mini PCs
    • Tablets
      • View Tablets
      • iPads
      • Android Tablets
      • e-Readers
      • Acer
      • Asus
      • Dell
      • HP
      • Lenovo
      • Intel
      • AMD
      • Nvidia
  • AI
    • View AI
      • AI Best Picks
      • AI Deals
      • AI Face-Offs
      • AI How-Tos
      • AI News
      • AI Reviews
      • ChatGPT
      • Copilot
      • Google Gemini
      • Apple Intelligence
      • Claude
      • DeepSeek
      • Perplexity
      • Grok
  • Wellness
    • View Wellness
    • Mattresses
      • View Mattresses
      • Mattress Best Picks
      • Mattress Deals
      • Mattress Face-Offs
      • Mattress How-Tos
      • Mattress News
      • Mattress Reviews
      • Mattress Care
      • Mattress Toppers
      • Pillows & Bedding
    • Fitness
      • View Fitness
      • Workouts
      • Smartwatches
      • Fitness Trackers
      • Smart Rings
      • Running
      • Apple Watch
      • Garmin
      • Oura
      • Adidas
      • Nike
    • Sleep
      • View Sleep
      • Sleep Tips
      • Sleep Tech
  • Home
    • View Home
      • Home Best Picks
      • Home Deals
      • Home Face-Offs
      • Home How-Tos
      • Home News
      • Home Reviews
      • Home Appliances
      • Home Office
      • Home Security
      • Smart Home
    • Outdoors
      • View Outdoors
      • Gardening
      • Lawn Care
      • Ninja
      • Shark
      • Dyson
      • KitchenAid
      • Ring
      • Breville
      • Best Picks
      • Deals
      • Face-Offs
      • How-Tos
      • News
      • Reviews
      • Coupons
      • Newsletter
      • Amazon
      • Apple
      • Samsung
      • Microsoft
      • Google
      • Sony
      • Meta
      • OpenAI
Forums
Trending
  • Exclusive Apple Interview
  • iPhone Air
  • iPhone 17 Pro
  • Wordle Today
  • Best laptops
  • Best TVs
  • Best Mattress
Don't miss these
A person typing on a laptop with warning messages displayed on screen
Malware & Adware Macs under attack from ‘cracked’ apps spreading dangerous info-stealing malware — don’t fall for this
Split images of Apple, Google and Facebook logos
Online Security 16 billion password data breach hits Apple, Google, Facebook and more — LIVE updates and how to stay safe
Hands on a laptop with a warning exclamation point
Online Security Almost 900,000 students and alumni hit in major college data breach — financial-aid info, Social Security numbers and more exposed
Green skull on smartphone screen.
Malware & Adware More than 250 malicious apps are spreading info-stealing malware on Android and iOS — delete these right now
Green skull on smartphone screen.
Malware & Adware This spyware is stealing photos on iPhone and Android — protect yourself now
An open lock depicting a data breach
Online Security Over Half a Million Hit in Major Healthcare Data Breach With SSNs, Financial Info and More Exposed — What to Do Now
Stressed man in a kitchen sat in front of a laptop with a coffee
Online Security Worried about the 16 billion data breach? I've been hacked, and this is everything I did to fix it
(L-R) Tom Cruise in "Mission: Impossible - The Final Reckoning," Scarlett Johannson in "Jurassic World Rebirth and David Corenswet in "Superman," three of the biggest 2025 summer movies.
Entertainment 35 summer movies we can’t wait to see in theaters, Netflix and more
Man stressed at computer
Online Security Has your computer been hacked? 11 ways to tell and what to do now
A person watching content on their tablet via Plex
Online Security Plex users need to change their passwords — there’s been another breach
A United Healthcare sign outside a building
Online Security Over 190 million hit in UnitedHealth data breach — confirmed largest in history
The CapCut logo magnified in a web browser
Online Security Popular TikTok video editor used in phishing scam – here’s how to stay safe
An open lock depicting a data breach
Identity Theft Protection Over half a million people impacted by major data breach — full names, SSNs, financial data and more exposed
A hand typing at a computer in a dark room, lit up by the laptop's keyboard LEDs and red LED light
Malware & Adware 200,000 passwords, credit card data and more stolen by this dangerous new malware — how to stay safe
iOS 26 developer beta running on iPhone showing Liquid Glass interface.
Phones I recently got hacked — here’s 5 hidden Apple security features I wish I’d known about
  1. Computing
  2. Internet
  3. Online Security

21 Worst Celebrity Hacks Ever

Round Ups
By Lauren L'Amie published 8 December 2016

From Miley Cyrus and Jennifer Lawrence to ScarJo and Ashton Kutcher, these are celebrity hacks that will go down in infamy.

Comments (0)

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Comments (0)
21 Worst Celebrity Hacks Ever

21 Worst Celebrity Hacks Ever

In the age of the internet, celebrity hacks seem almost commonplace. Whether it's a batch of nude photos of Jennifer Lawrence or Scarlett Johansson, or it's private emails taken from the inbox of Sarah Palin, we've come to expect frequent swarms of stolen internet goods.

But the art of breaking into digital accounts dates back much further than you'd think. The Trojan horse, social engineering and other methods of getting into a phone, network, account or computer seem to go back to the days of, well, the original Trojan horse. And yet with each new hack, a new scandal ensues.

Here is our comprehensive list of the most memorable celebrity hacks. Learn from these security nightmares as best you can.

Photo: Jason Merritt/Getty Images

Page 1 of 22
Page 1 of 22
Kate Upton, Jennifer Lawrence and 50 More Celeb Nudes (2014)

Kate Upton, Jennifer Lawrence and 50 More Celeb Nudes (2014)

There were few things grosser than the flood of celebrity nude images in August 2014 that came to be known as "The Fappening," a name with dubious connotations. Among the most famous victims were Jennifer Lawrence, Kate Upton and Kirsten Dunst, whose nude photos were widely leaked onto 4chan, Reddit and eventually into mainstream media. Dozens more women (and a couple of men) were also involved, not all of whom confirmed the images were of them.

Ryan Collins, one of two masterminds responsible for breaking into the Apple accounts of about 100 people (mostly female celebrities), was sentenced to 18 months in prison in October 2016. Hopefully, Collins' apprehension will prevent others from seeking out celebrity nudes.

How to Avoid This: Enable two-factor authentication on your iCloud account.

Photo: Donald Bowers/Getty Images

MORE: 15 Best Mobile Privacy and Security Apps

Page 2 of 22
Page 2 of 22
Scarlett Johansson (2011)

Scarlett Johansson (2011)

In 2011, a few nude photos of actress Scarlett Johansson — which she said were meant for then-husband Ryan Reynolds — were leaked to the internet. Investigators quickly traced the leak to Chris Chaney, a 35-year-old hacker from Jacksonville, Florida, who later went to prison for 10 years for illegally accessing the email accounts of more than 50 people in the entertainment industry.

How to Avoid: Set up two-factor authentication on all your email accounts.

Photo: Kevin Winter/Getty Images

MORE: 10 Worst Online Scams and How to Avoid Them

Page 3 of 22
Page 3 of 22
Leslie Jones (2016)

Leslie Jones (2016)

Actress and Saturday Night Live star Leslie Jones had her personal website hacked into in August 2016, resulting in the theft and public release of her driver's license, her passport and some nude photos. A month earlier, after the release of the Ghostbusters remake, Jones had become a target for racist online harassment, particularly via Twitter.

The abuse became so overwhelming that Jones temporarily quit using social media. As a result, Twitter permanently banned Milo Yiannopoulos, a provocative writer whose Twitter followers had been particularly brutal in harassing Jones. Jones later came back online, tweeting in September, "I ALWAYS GET BACK UP!"

How to Avoid: Unknown. It's not clear how Jones' website was broken into.

Photo: Alberto E. Rodriguez/Getty Images

MORE: The Worst Data Breaches of All Time

Page 4 of 22
Page 4 of 22
Paris Hilton (2005)

Paris Hilton (2005)

One of the first major hacks that violated a female celebrity's privacy was committed by a group of sneaky teen hackers. In 2005, young heiress Paris Hilton's T-Mobile account was broken into using "social engineering" — tricking people into breaching security protocols or turning over confidential information. In the case of The Simple Life reality star, this involved a simple phone call. The kids reportedly manipulated a T-Mobile employee into giving them access to a site that listed customer telephone numbers.

Because the hackers had already learned how to reset the password on any T-Mobile account if they knew the phone number, they locked Hilton out of her phone and T-Mobile account and accessed all of her texts, video and photos — including several nude images. They also took a break to prank-call actor Laurence Fishburne (of The Matrix fame) because, you know, why not?  

How to Avoid: You can't. Dumb employees will always make dumb mistakes.

Photo: Michael Dodge/Getty Images

MORE: Best Encrypted Messaging Apps

Page 5 of 22
Page 5 of 22
Miley Cyrus (2007)

Miley Cyrus (2007)

Miley Cyrus' MySpace and Google accounts were broken into by teenage hacker Josh Holly, who tricked a MySpace employee into granting access to a list of account passwords. Holly found that Cyrus' MySpace password also worked for her Gmail account, in which he found provocative photos she had sent to Nick Jonas.

Holly put the photos online and bragged about never getting caught — which led to the FBI raiding his home. (In 2011, he pleaded guilty to credit-card fraud and breaking into other MySpace accounts.) Good thing we all collectively deleted any provocative duckface selfies and embarrassing "im bored rawr XD" status updates years ago...right?  

How to Avoid: Set up two-factor authentication on your Google account. Delete your MySpace account.

Photo: Frazer Harrison/Getty Images

MORE: Best Cloud Backup Services

Page 6 of 22
Page 6 of 22
Sarah Palin (2008)

Sarah Palin (2008)

In September 2008, then-Alaska governor and vice presidential candidate Sarah Palin's Yahoo account was broken into when a 20-year-old man found that Palin had made her own birth date the answer to a password-reset question. The man, who later went to prison for the break-in, posted screenshots of Palin's emails to WikiLeaks. The hack revealed Palin's family photos and evidence that she may have used her personal email account to conduct official business.

How to Avoid: Make up weird answers to password-reset "security questions" that no one else can learn or guess.

Photo: Alex Wong/Getty Images

MORE: Top 10 Malware Myths and Facts

Page 7 of 22
Page 7 of 22
Lady Gaga, Justin Timberlake, Kelly Clarkson, Ke$ha (2010)

Lady Gaga, Justin Timberlake, Kelly Clarkson, Ke$ha (2010)

Back in 2010, a German teenager and a 23-year-old accomplice allegedly hacked into computers owned by Lady Gaga, Justin Timberlake, Kelly Clarkson and Ke$ha, using malware to steal the artists' unfinished songs. The hackers then sold the songs online for more than $10,000. But rather than remain silent or brag about the feat, the teenager penned a strangely sweet and very remorseful apology to a German paper, explaining that he "never thought it would go so far."

How to Avoid: Use antivirus software to stop malware, even if you're on a Mac.

Photo: Scott Gries/Getty Images

MORE: 25 Things You Didn't Know Could Be Hacked

Page 8 of 22
Page 8 of 22
Ashton Kutcher (2011)

Ashton Kutcher (2011)

Whoever hacked into Ashton Kutcher's Twitter account in 2011 didn't seem to be interested in compromising the actor himself. He or she really seemed to want to draw attention to Twitter's security problems. A tweet from Kutcher's account read: "Ashton, you've been Punk'd. This account is not secure. Dude, where's my SSL?"

The message was a demand for SSL, or Secure Sockets Layer, a security feature that was not then standard on Twitter. Kutcher's Twitter account was reportedly hijacked again in 2012 with a tweet referencing a romantic encounter, at a time when rumors about Kutcher's relationship with screenwriter Lorene Scafaria were swirling around the web. (Kutcher was still married to Demi Moore and had begun a relationship with current wife Mila Kunis.)

How to Avoid: Use a strong password for your Twitter account, and set up two-factor authentication.

Photo: Jason Merritt/Getty Images

MORE: 15 Android Security Tips You Need to Know

Page 9 of 22
Page 9 of 22
Michelle Obama, Beyoncé, Jay-Z, Kim Kardashian and dozens more (2013)

Michelle Obama, Beyoncé, Jay-Z, Kim Kardashian and dozens more (2013)

A group of Russian hackers "doxxed" dozens of famous people by posting a slew of credit reports online in early 2013, divulging bank-account numbers, mortgage information and credit-card details. According to the stolen data, Michelle Obama had both Gap and Banana Republic credit cards, and Jay-Z owed a lot of money to American Express. The idea that Michelle Obama has the same average-person Gap credit card as you is pretty cool.

How to Avoid: You can't, other than by subjecting yourself to a permanent credit freeze. The documents were obtained legally and then misused.

Photo: Mike Coppola/Getty Images

MORE: What to Do After a Data Breach

Page 10 of 22
Page 10 of 22
Madonna (2014)

Madonna (2014)

The Internet really bummed out Madonna in December 2014. The singer was pushed to release her 2015 album, "Rebel Heart," four months ahead of schedule after tracks were leaked online, compromising the album as a whole. Madonna's manager, Guy Oseary, took to Twitter to ask fans for help in apprehending the hacker (although it's possible the theft was an inside job). Madonna herself said that the leaked tracks were "unfinished demos," and thanked fans who remained loyal by not listening to the tracks.  

How to Avoid: Not clear. The leaker could have worked at the recording studio or record company.

Photo: Kevin Winter/Getty Images

MORE: Simple Ways to Avoid Being Hacked

Page 11 of 22
Page 11 of 22
Angelina Jolie (2014)

Angelina Jolie (2014)

During the early stages of planning for two feature films (a Steve Jobs biopic, which was made, and an adaptation of Cleopatra, which wasn't) Angelina Jolie became the subject of some petty work gossip — not unlike what probably happens in your own office. This round, however, was between two Hollywood bigwigs.

In early 2014, heavy-hitting movie producer Scott Rudin sent a strongly worded email to Amy Pascal, head of Sony motion pictures, that made it very clear that he was not an Angie fan by calling Jolie a "minimally talented spoiled brat." The exchange was revealed later that year when Sony Pictures Entertainment was attacked by North Korean hackers and the company's email archives were posted online. But hold the drama — while Hollywood waited for the typical celebrity beef to unfold, Jolie told the New York Times that it didn't really faze her.

How to Avoid: You can't control what other people say about you.

Photo: Jason Merritt/Getty Images

MORE: 11 Ways to Tell If Your Identity Has Been Stolen

Page 12 of 22
Page 12 of 22
Sienna Miller (2014)

Sienna Miller (2014)

It's hard to mention phone hacking without mentioning the lawsuits against the News of the World, a London tabloid that is now defunct, whose employees broke into the voicemail accounts of, well, almost every prominent person in Britain.

It's a complicated, high-profile case, and the targets ran the gamut from members of the British royal family to victims of the 2005 London bombings, but several Hollywood stars got the spotlight on their voicemail messages. They included actress Sienna Miller, who in 2005 was in a relationship with actor Jude Law. Miller was accused of having had an affair with Daniel Craig (aka James Bond) after her voicemail messages were revealed nine years later. Other phone-hack victims included Hugh Grant, Charlotte Church and J.K. Rowling.

How to Avoid: It's hard to do so when most voicemail accounts can be accessed with a four-digit PIN.

Photo: Justin Sullivan/Getty Images

MORE: Best Smartphones

Page 13 of 22
Page 13 of 22
Bjork (2015)

Bjork (2015)

Madonna isn't the only singer disenchanted with the internet's handling of album releases. When Bjork's 2015 album, "Vulnicura," was leaked online two months too early, the Icelandic singer made a last-minute decision to release the album in its entirety on iTunes as a response.

That put Bjork's record label, One Little Indian, in a tough spot, due to its original agreement to offer the album exclusively on Amazon. Although Amazon cooperated and sold the album to iTunes, Bjork's label still had to deal with the repercussions of releasing an album too early, such as a drop in expected sales.

How to Avoid: As with Madonna's case, this could have been leaked by anyone on the inside.

Photo: Karl Walter/Getty Images

MORE: 18 Best Music Apps

Page 14 of 22
Page 14 of 22
Britney Spears (twice in 2009)

Britney Spears (twice in 2009)

In the early days of Twitter, account takeovers were just as novel as the platform itself. Maybe that's why Britney Spears, then listed as a "Top 10" Twitter user, had her account easily hijacked twice in one year. One tweet, from Nov. 12, 2009, read: "I give myself to Lucifer every day for it to arrive as quickly as possible. Glory to Satan!" That was followed by a similarly dark sentiment: "i hope that the new world order will arrive as soon as possible! -Britney." The hacker changed Britney's background to Illuminati-themed wallpaper, just in case you missed the message.

How to Avoid: Choose a strong Twitter password and enable two-factor authentication.

Photo: Jason Kempin/Getty Images

MORE: How to Set a Live Photo as Your iPhone's Wallpaper

Page 15 of 22
Page 15 of 22
David and Victoria Beckham (2005)

David and Victoria Beckham (2005)

Celebrity couples deal with vicious rumors all the time — it's all a part of the game. Soccer superstar David Beckham and his wife Victoria Beckham, aka Posh Spice, were both targeted in 2005 when News of the World reported that Beckham was having an affair with his then-assistant, Rebecca Loos. The story went on to win "Scoop of the Year" at the British Press Awards, and led to the Beckhams' suspicions that their cellphone voicemail accounts had been compromised.

In 2011, Beckham and a slew of other celebrity phone-hacking victims sued the newspaper's parent company, and while Beckham never formally testified, the case resulted in a police investigation and the eventual shutdown of the News of the World.

How to Avoid: It's hard to do so when most voicemail accounts can be accessed with a four-digit PIN.

Photo: Kevin Winter/Getty Images

MORE: 10 Best Soccer Apps

Page 16 of 22
Page 16 of 22
Carla Bruni (2011)

Carla Bruni (2011)

The mere promise of celebrity nude photos became a high-value tool for foreign espionage, all at the expense of then-French first lady, actress and singer Carla Bruni. During a Group of 20 economic summit in Paris in 2011, Chinese spies baited senior foreign officials with the subject line, "French First Lady nude photos!" This prompted nearly every recipient to open an attachment that, perhaps to some recipients' dismay, contained malware rather than risqué photos.

How to Avoid: Don't click on unsolicited email attachments.

Photo: Getty Images

MORE: 7 Tips for When Your Email Account Is Hacked

Page 17 of 22
Page 17 of 22
Kendall Jenner, Harry Styles (2016)

Kendall Jenner, Harry Styles (2016)

When the One Direction frontman and the Kardashian sibling went to St. Bart's for the 2015 Christmas holidays, little did they know their vacation photos would soon end up online. Yet that's exactly what happened a few months later, when an enterprising One Direction fan broke into the iCloud account of Anne Cox, Harry's mother, and posted the snaps online. There wasn't anything terribly risqué about the images — after all, these are the pictures Harry wanted his mother to see — but it was a serious breach of privacy nonetheless.

How to Avoid: Enable two-factor authentication on your iCloud account — especially if you're closely related to a celebrity.

Photo: Ari Perilstein/Getty Images

MORE: How to Back Up Your iPhone

Page 18 of 22
Page 18 of 22
Jack Black (2016)

Jack Black (2016)

Remember when the Twitter-verse thought for a split second that actor Jack Black had left this Earth? You can thank your favorite professional social network, LinkedIn. After a huge number — 117 million accounts' worth, give or take a few — of usernames and passwords were copped from LinkedIn by a team of hackers and posted online, many celebrity accounts were subject to misleading tweets in mid-2016.

A tweet from the account of Tenacious D, Black's band, abruptly led followers to believe the actor/musician had died. Among other tweetjacking victims were Rolling Stones guitarist Keith Richards, Kylie Jenner and even late Jackass star Ryan Dunn, five years after his death. Even Facebook CEO Mark Zuckerberg, who is seemingly the boss of half the internet, had his LinkedIn and Pinterest accounts compromised several weeks after the LinkedIn data leaks went public.

How to Avoid: Don't use the same password for different online accounts.

Photo: Kevork Djansezian/Getty Images

MORE: Best Password Managers

Page 19 of 22
Page 19 of 22
Pippa Middleton (2016)

Pippa Middleton (2016)

The British royal family has had some bad luck with hackers, and Pippa Middleton, sister of the Duchess of Cambridge, wasn't exempt, despite not being a royal herself. An arrest was made this year shortly after Middleton's iCloud account was hacked and more than 3,000 private photos were stolen. Both Britain's The Sun and Daily Mail newspapers reported that a seller had contacted them under an anonymous name, offering the photos for a sum of at least $70,000.   

How to Avoid: Enable two-factor authentication on your iCloud account.

Photo: Clive Brunskill/Getty Images

MORE: Why iPhones Don't Need Antivirus Software

Page 20 of 22
Page 20 of 22
Charlie Sheen, the X Factor, Red Cross (2016)

Charlie Sheen, the X Factor, Red Cross (2016)

A potential breach in Twitter security resulted in tons of celebrity and organization accounts — from Charlie Sheen to the accounts of the American Red Cross, Sky News and the New Yorker magazine — all tweeting out the same spam link in November 2016. Every tweet implored followers to click a link that would "get them more followers," a common refrain in spammy links. While it seems unlikely that each celeb or organization account user clicked a spam link, leading to their own hacking demise, it could be that hackers targeted Twitter as a whole, focusing efforts on high-profile users.

How to Avoid: Not clear, as this may have been an internal Twitter problem.

Photo: Kevin Winter/Getty Images

MORE: How to Lock Down Your Twitter Privacy Settings

Page 21 of 22
Page 21 of 22
Rachel Roy (2016)

Rachel Roy (2016)

In a vicious attempt to defend the Beyhive at all costs, Beyoncé fans in the spring of 2016 were suspected of hacking an email account belonging to designer Rachel Roy after the internet theorized that she was, in fact, "Becky with the good hair," a reference Beyoncé makes to a rival for her husband's affections on the album "Lemonade."

As soon as the album was released, Beyoncé fans (and trolls alike) began endlessly commenting bee emojis on all of Roy's Instagram photos. Roy reportedly called the LAPD after discovering that her iCloud and Gmail accounts had been hacked, though the calls to police were never confirmed by sources other than TMZ. But we wouldn't put it past Queen Bey's most loyal followers to hack the account of a supposed enemy.

How to Avoid: Enable two-factor authentication on your email accounts.

Photo: Jennifer Graylock/Getty Images

MORE: How to Be Smarter Than Kim Kardashian on Instagram

Page 22 of 22
Page 22 of 22
Comments (0)
TOPICS
Security
Lauren L'Amie

Lauren L'Amie is an SEO Content Strategist at Wirecutter, and was previously an editor for Tom's Guide, writing mainly about phones and social media. She has also written for Cosmopolitan, New York Magazine, and The Daily Dot, focusing on a range topics from health, sex, and lifestyle to news and politics. 

Read more
A person typing on a laptop with warning messages displayed on screen
Macs under attack from ‘cracked’ apps spreading dangerous info-stealing malware — don’t fall for this
 
 
Split images of Apple, Google and Facebook logos
16 billion password data breach hits Apple, Google, Facebook and more — LIVE updates and how to stay safe
 
 
Hands on a laptop with a warning exclamation point
Almost 900,000 students and alumni hit in major college data breach — financial-aid info, Social Security numbers and more exposed
 
 
Green skull on smartphone screen.
More than 250 malicious apps are spreading info-stealing malware on Android and iOS — delete these right now
 
 
Green skull on smartphone screen.
This spyware is stealing photos on iPhone and Android — protect yourself now
 
 
An open lock depicting a data breach
Over Half a Million Hit in Major Healthcare Data Breach With SSNs, Financial Info and More Exposed — What to Do Now
 
 
Latest in Online Security
A fake text message on a smartphone being held by both hands
Those urgent text messages aren't from your motor vehicle department - here's how to tell they're fake
 
 
Green skull on smartphone screen.
This new Android banking trojan can automatically transfer money off your phone to hackers
 
 
A person watching content on their tablet via Plex
Plex users need to change their passwords — there’s been another breach
 
 
A person typing on a laptop with warning messages displayed on screen
Macs under attack from ‘cracked’ apps spreading dangerous info-stealing malware — don’t fall for this
 
 
Man looks upset while reading letter
7 steps to stay safe after receiving a data breach notification letter
 
 
macOS laptop
These iCloud Calendar invites look legitimate but are tricky phishing attacks — here’s how to tell
 
 
Latest in Round Ups
Bowers & Wilkins PX7 S3
I review noise-cancelling headphones for a living — here's my top picks for every budget
 
 
Garmin Forerunner 970
I review running watches and these are my top 3 suggestions for most people
 
 
B&W PX7 S3, Dali IO-8, JLab JBuds Lux
Forget AirPods Max — here's the 5 headphones I recommend for every budget
 
 
The author and partner on a mountain summit in bali at sunrise, with mountain shadows in the background and a blue morning sky
5 tech travel hacks I learned after 2 months backpacking in Asia — don't make the same mistakes as me
 
 
Young woman in yellow walking with smart phone on the old town square in Prague city
5 best summer travel apps to help you have the perfect vacation
 
 
Weber Slate griddle with accessories
I’ve been using a griddle for a year — these are the best starter accessories everyone needs
 
 
No comments yet Comment from the forums
LATEST ARTICLES
  1. Amazon holiday deliveries
    1
    Get a free $10 Amazon credit when you buy 3 cleaning products — here's how
  2. 2
    Anthropic (finally) rolls out Memory feature — here’s who can get it
  3. 3
    How to watch Netflix from anywhere in the world
  4. 4
    Apple discloses how much iPhone Air battery replacement and repairs will cost you
  5. 5
    I'm getting a free iPhone 17 Pro this weekend — here's how you can get one too

Tom's Guide is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

  • Terms and conditions
  • Contact Future's experts
  • Privacy policy
  • Cookies policy
  • Accessibility Statement
  • Advertise with us
  • About us
  • Archives
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...