Accéder au contenu principal

Apple dancing the two-step again with iCloud.com security boost

Apple dancing the two-step again with iCloud.com security boost

Trusted devices at the ready


Apple dancing the two-step again with iCloud.com security boost
Apple will require users to verify their identities with a trusted device
Long after adding two-step verification for Apple ID related shenanigans, Apple is now boosting the security of its iCloud.com suite with the same identity verification tech.
As spotted by an Apple Insider reader, the firm is now requiring some users to set up a trusted device in order to gain access to the iCloud website and apps like Pages, Mail, Calendar and more.
After logging in, users will be sent a four-digit pin code to the secondary device, which they must then enter at iCloud.com in order to proceed.
Previously, users have been able to access everything by simply logging in with their iCloud username and password.

Roll out

According to reports, the only app that does not require a two-step unlock is the web-based Find My iPhone tool, which makes sense as the errant iOS device may actually be the trusted device in question.
Not all iCloud users have received the update as yet, so it can be presumed Apple will continue to roll this out over the coming days.

Commentaires

Posts les plus consultés de ce blog

Android Wear 2.0 update fails to fix persistent issues, unleashes more bugs

Android Wear 2.0 update fails to fix persistent issues, unleashes more bugs Android Wear 2.0 for smart watches got an update recently and it seems the update has also brought in some serious issues with it. Several smartwatch users have reported on online forums that the features introduced through the update are not functioning aptly along with the incapability to fix a persistent issue of the device that is messing up with reminders. Wear 2.0 that was first released in February 2017 brings custom watch face complications, Google Assistant support, and a new system interface to compatible smart watches. The issue with the Google Assistant that have been reported by users is that it is incapable of performing tasks other than carrying out basic internet searches. The assistant should also be capable of setting timers and control smart lights which it simply isn't doing. The problem with reminders has long been noted and it is a bigger issue. Users have had a problem...

India rejects demands by Apple on tax incentives

India rejects demands by Apple on tax incentives India has finally rejected key demands by Apple for customs duty rebate on imported equipment for making iphones in the country. In a written reply to the Lok Sabha, commerce and industry minister Nirmala Sitharaman said that "requests regarding such rebate were examined and... not accepted." Sitharaman said the government has received representations seeking concessions, including 30 percent local sourcing of component, duty exemption on manufacturing and repair units, components, capital equipment and consumables for smart phone manufacturing, service, and repair. She further said that there would be no exemption from basic customs duty, countervailing duty (CVD) and special additional duty (SAD) on imports of articles needed for the repair of the mobile phones. The Cupertino-based technology major has asked for incentives from the Department of Electronics and Information Technology (Diety). Apple had asked for tax c...

Malware apps make their way to Google Play Store

Malware apps make their way to Google Play Store Security firm Lookout has detected a series of malicious mobile phone apps that can remotely control the infected smartphones. The app that goes by the name SonicSpy has at least three versions that made their way to the Google Play Store.   This has compromised the security of Android device users. The malware once installed on a device functions as a messaging app however in the background it takes over several functions of a device which includes the ability to send text messages, make calls, access contacts, and Wi-Fi data. Lookout stated that the developer who came up with the malware is most probably based in Iraq. The developer fabricated close to a thousand messaging apps that were malicious in nature and were developed to hijack user's smartphone. The developer embedded spy functions into a public source code for a popular instant messaging app, Telegram and renamed the apps to Soniac, Hulk Messenger, and Tro...