Will Apple iPhone Stolen Device Protection keep your data safer? (2024)

Will Apple iPhone Stolen Device Protection keep your data safer? (1)

Stolen Device Protection aims to protect users when thieves or even cybercriminals know of their private passwords for their Apple ID. (Image by Shutterstock).

By Aaron Raj

  • Apple has introduced a new stolen device protection feature for the iPhone in the iOS 17.3 beta.
  • Stolen Device Protection aims to protect users when thieves or even cybercriminals know of the private passwords for their Apple ID.
  • There will also be a geographical element to the protection – if you go somewhere unusual, the phone will request facial recognition befor letting you access sensitive data.

While mobile phone security continues to improve, there is still one big problem – what happens when your phone gets stolen? Over the years, mobile phones have added new features that help users detect or lock their phone should they lose it or have it stolen.

But it seems that’s still not sufficient protection. Take the iPhone for example. Apple boasts that the iPhone is known for security, with the iOS often being hard to compromise. Yet, the iPhone is still one of the most stolen devices in the world, reflecting the value it has in the market.

In fact, data provided by the London Metropolitan Police revealed that in 2022, a staggering 90,864 mobile devices were reported stolen in London alone. That’s about 250 phones being stolen daily in the city. In another report by Deloitte, accessing owners’ email addresses, contacts, pictures and other features on stolen smartphones was easy, despite the numerous security features on mobile devices today.

Reports also showed that stolen iPhones could pose a bigger threat, as the thieves could just reset a victim’s Apple ID password, turn off Find My iPhone, view passwords stored in iCloud Keychain for banking and email accounts, and more. Put simply, the thieves could steal an individual’s entire digital life just by getting access to their smartphone.

And here’s where it gets even scarier. Given that almost all our data is stored in our mobile devices today, be it personal or work, thieves could use this data to create more havoc. For example, once a thief is able to unlock a stolen iPhone, they could use it to request funds, make purchases or even access personal images to deepfake on the device.

Apple in particular has created solutions to deal with this. These included the Find My Phone and Lost My Phone features. Certain apps also have kill switches that can block access to them if a device is compromised. However, a report by The Wall Street Journal in 2023 showed how thieves can use Apple’s optional recovery key security optionto permanently lock out iPhone users from their Apple ID account.

Will Apple iPhone Stolen Device Protection keep your data safer? (9)

Apple has introduced a new stolen device protection feature for the iPhone in the iOS 17.3 beta.

Apple improves iPhone security features

Given the increasing concerns over thieves accessing stolen iPhones and changing user Apple ID passwords, Apple will be introducing a new security mode for iPhones. The feature, Stolen Device Protection aims to protect users when thieves or even cybercriminals know the private passwords for their Apple ID.

According to a report by CNBC, the Stolen Device Protection feature will create a second layer of security, making it harder for thieves to use the passcode to create havoc with a device that has been stolen or compromised.

SURPRISING SHIFT: HUAWEI AND XIAOMI SURPASS APPLE IN CHINA’S SINGLES’ DAY SALESDashveenjit Kaur | 28 November, 2023

The report explained that if the iPhone is at a location that is not usually associated with its owner, and Stolen Device Protection is turned on, the device will require Apple’s FaceID facial recognition in addition to a passcode for users to perform sensitive actions, such as viewing stored passwords or wiping the phone. It also adds a delay when changing the user’s Apple ID password.

Apple is enabling multi-factor authentication on its devices. As such, even though a phone is stolen, the thief will still not be able to unlock it. The victim could then access their Find My Device to locate it or simply just lock it up.

“As threats to user devices continue to evolve, we develop new protections for our users and their data. iPhone data encryption has long led the industry, and a thief can’t access data on a stolen iPhone without knowing the user’s passcode. In the rare cases where a thief can observe the user entering the passcode and then steal the device, Stolen Device Protection adds a sophisticated new layer of protection,” an Apple spokesperson explained.

With Stolen Device Protection, Apple will essentially prompt every iPhone user to input a four-digit or six-digit passcode when the device is set up. Before the new function was added, Apple’s privacy and stolen device protections, including its FaceID facial recognition tool, were tied to that passcode, allowing anyone with a stolen device and passcode to take full control of the phone.

The new feature will be available for those who have the latest developer beta of iOS, iOS 17.3. The opt-in feature will be shipped to other iPhone users in the coming weeks when iOS 17.3 is launched to the public.

Will Apple iPhone Stolen Device Protection keep your data safer? (12)

Thieves may soon find it harder to get access to stolen iPhones. (Image generated by AI).

Other ways to secure your mobile devices

While Apple has unveiled its plans to secure iPhones, other phone manufacturers also have their own mechanisms and features to secure and lock devices should they go missing or get stolen. However, users still need to be vigilant when using their devices and be mindful of the passwords they create for their devices.

Here are some ways to secure mobile devices from cyberattacks, theft, or loss:

  • Use strong passwords, biometrics, or two-factor authentication to lock the device and prevent unauthorized access.
  • Encrypt devices and data to make them unreadable to anyone who does not have the decryption key.
  • Install a reputable anti-virus software and keep it updated to scan and remove any malware or viruses from your device.
  • Avoid using public or free wifi networks that are not encrypted or secured, as they can expose devices to hackers and eavesdroppers. Use a VPN (virtual private network) to encrypt your internet traffic and hide your online activity.
  • Download apps only from trusted sources, such as the official app stores, and check the permissions and reviews before installing them. Avoid clicking on suspicious links or attachments that may contain malware or phishing scams.
  • Backup data regularly to a cloud service or an external device, such as a USB drive, in case the device is lost, stolen, or damaged. Users can also use a remote wipe feature to erase their data from a lost or stolen device.
  • Update the device’s operating system and apps to the latest version to fix any security vulnerabilities and bugs that may compromise your device.
  • Be careful about what is shared on social media or other online platforms, as hackers may use personal information to guess passwords, answer security questions, or target victims with phishing or social engineering attacks.

These are some of the basic steps you can take to secure their mobile devices and protect your privacy and data.


IPHONE APPLE MOBILE DEVICE

By Aaron Raj

Aaron Raj

Aaron enjoys writing about enterprise technology in the region. He has attended and covered many local and international tech expos, events and forums, speaking to some of the biggest tech personalities in the industry. With over a decade of experience in the media, Aaron previously worked on politics, business, sports and entertainment news.

READ MORE

  • Local businesses, global lessons for the APAC
  • India needs 10-20 semiconductor fabs in the next decade: SEMI CEO
  • Intel partners with Japan to establish new chip research centre
  • Go Hub and Pixlr – Setting-up for success! Elevating regional and global tech leadership with bespoke initiatives
  • From defence to offence: Unleashing genAI’s transformative power in APAC

TRENDING TOPICS

PLATFORM IDENTITY SECURITY MSP STRATEGY SURVEYS CONSTRUCTION ADS CLOUD TELEPHONY VULNERABILITIES RECRUITMENT
Will Apple iPhone Stolen Device Protection keep your data safer? (2024)
Top Articles
MT4 Trading Platform: What Are Pros and Cons of MT4?
Do I need travel insurance? Uswitch explains if you need it or not. | Uswitch
Jack Doherty Lpsg
Skylar Vox Bra Size
Bashas Elearning
Toyota gebraucht kaufen in tacoma_ - AutoScout24
27 Places With The Absolute Best Pizza In NYC
Craigslist Cars And Trucks Buffalo Ny
Weapons Storehouse Nyt Crossword
Www Thechristhospital Billpay
Decaying Brackenhide Blanket
Graveguard Set Bloodborne
Fcs Teamehub
Whiskeytown Camera
Dark Souls 2 Soft Cap
Edible Arrangements Keller
Classic Lotto Payout Calculator
Guilford County | NCpedia
Kris Carolla Obituary
Condogames Xyz Discord
Vipleaguenba
Osborn-Checkliste: Ideen finden mit System
How pharmacies can help
Cocaine Bear Showtimes Near Regal Opry Mills
FDA Approves Arcutis’ ZORYVE® (roflumilast) Topical Foam, 0.3% for the Treatment of Seborrheic Dermatitis in Individuals Aged 9 Years and Older - Arcutis Biotherapeutics
Melendez Imports Menu
Lisas Stamp Studio
Craigslist Org Appleton Wi
Mj Nails Derby Ct
Weve Got You Surrounded Meme
Evil Dead Rise Ending Explained
Craigslist Comes Clean: No More 'Adult Services,' Ever
Remnants of Filth: Yuwu (Novel) Vol. 4
This Is How We Roll (Remix) - Florida Georgia Line, Jason Derulo, Luke Bryan - NhacCuaTui
Askhistorians Book List
King Soopers Cashiers Check
Hotel Denizen Mckinney
Salons Open Near Me Today
Upstate Ny Craigslist Pets
Indiana Immediate Care.webpay.md
2012 Street Glide Blue Book Value
Cruise Ships Archives
Regis Sectional Havertys
R Nba Fantasy
Winco Money Order Hours
Indio Mall Eye Doctor
Lamp Repair Kansas City Mo
R: Getting Help with R
Sapphire Pine Grove
House For Sale On Trulia
Food and Water Safety During Power Outages and Floods
Who We Are at Curt Landry Ministries
Latest Posts
Article information

Author: Nathanael Baumbach

Last Updated:

Views: 6345

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Nathanael Baumbach

Birthday: 1998-12-02

Address: Apt. 829 751 Glover View, West Orlando, IN 22436

Phone: +901025288581

Job: Internal IT Coordinator

Hobby: Gunsmithing, Motor sports, Flying, Skiing, Hooping, Lego building, Ice skating

Introduction: My name is Nathanael Baumbach, I am a fantastic, nice, victorious, brave, healthy, cute, glorious person who loves writing and wants to share my knowledge and understanding with you.