Of course, they’ll resell the iPhone too. After that, they may transfer money from bank accounts, apply for an Apple Card, and more, all while keeping the user locked out of their account. They can even look in Photos for pictures of documents containing confidential information, such as credit cards and ID cards. Then they use Apple Pay to buy things and access passwords stored in iCloud Keychain. With the new password, they disable Find My, making it impossible for the iPhone’s owner to erase it remotely. However it happens, once the thief has a user’s iPhone and passcode, they change the user’s Apple ID password-which is shockingly easy for them to do. Some attacks involve drugging people in bars or even violence, but the most avoidable involve the thief or a confederate surreptitiously observing the iPhone user entering their passcode before snatching the iPhone and running. Joanna Stern and Nicole Nguyen of the Wall Street Journal have published an article (paywalled) and accompanying video that describes attacks on hundreds of iPhone users in major cities throughout the United States.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |