Apple Testing New Stolen Device Protection Feature for iPhones

Apple on Tuesday announced that it's testing a new security feature that should prevent iPhone thieves from gaining complete control over the victim's device and online accounts, even if the phone's passcode has been compromised.
The Wall Street Journal reported earlier this year that many iPhone owners around the United States complained about having significant amounts of money transferred out of their accounts after their phone had been stolen.
An investigation showed that the thieves, who typically targeted bargoers, were often part of a crime ring that stole phones, but not before one member of the group observed or recorded the victim entering the passcode to unlock the iPhone that would soon get stolen.
Knowing the passcode of the stolen phone enabled the thieves to take control of the victim's Apple ID and access financial accounts from which they could transfer money to accounts they controled.
With the release of iOS 17.3 beta, Apple is testing a new Stolen Device Protection feature that adds an additional layer of security in case an iPhone gets stolen and the thief has somehow also obtained the owner's passcode.
When the feature is enabled, access to saved passwords is protected by Face ID verification.
When someone attempts to erase the phone, use saved payment methods, apply for Apple Card, disable Find My, or use passwords or passkeys a security delay is triggered, which involves a biometric authentication check immediately and again after one hour.
This delay is not activated when the iPhone is at familiar locations, such as the user's home or workplace.
The Stolen Device Protection feature can be tested by iOS 17.3 beta users by enabling it from the Face ID & Passcode screen in Settings.


This Cyber News was published on www.securityweek.com. Publication date: Wed, 13 Dec 2023 16:13:18 +0000


Cyber News related to Apple Testing New Stolen Device Protection Feature for iPhones

Microservices Resilient Testing Framework - As organizations increasingly embrace the microservices approach, the need for a resilient testing framework becomes important for the reliability, scalability, and security of these distributed systems. From preemptive problem-solving to the ...
6 months ago Feeds.dzone.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
7 months ago Esecurityplanet.com
How Does Automated API Testing Differ from Manual API Testing: Unveiling the Advantages - Delve into automated versus manual API testing for efficient software delivery. See how automation speeds validation while manual testing provides human insight, ensuring comprehensive coverage for robust development. In the domain of software ...
5 months ago Hackread.com
How to do Penetration Testing effectively - In today's digital era, penetration testing has become crucial to an organisation's cybersecurity strategy. From network penetration testing to web application and mobile app penetration testing, a comprehensive pen test covers a wide range of attack ...
1 month ago Securityboulevard.com
Apple iOS 17.3: How to Turn on iPhone's New Stolen Device Protection - Apple today launched a new tool for iPhones to help reduce what a thief with your phone and passcode can access. The feature, called Stolen Device Protection, adds extra layers of protection to your iPhone when someone tries to access or change ...
5 months ago Wired.com
Update your iPhone and turn on Stolen Device Protection ASAP. Here's why - Apple has rolled out a new update that promises to better secure your iPhone from the bad guys. Released on Monday, iOS 17.3 kicks in a few helpful new features, including Apple Music playlist sharing and AirPlay support for hotel room TVs. But the ...
5 months ago Zdnet.com
Apple Testing New Stolen Device Protection Feature for iPhones - Apple on Tuesday announced that it's testing a new security feature that should prevent iPhone thieves from gaining complete control over the victim's device and online accounts, even if the phone's passcode has been compromised. The Wall Street ...
6 months ago Securityweek.com
How to Use Pen Testing to Find Vulnerabilities - One effective method for conducting an information security audit is through penetration testing. The contractor would conduct thorough testing and provide detailed penetration reports, complete with recommendations for safeguarding corporate data. ...
5 months ago Feeds.dzone.com
Apple Move iPad Engineering To Vietnam - Fresh reports of Apple shifting manufacturing from China, with iPad product development resources relocated to Vietnam. Apple continues to strengthen its manufacturing and development capabilities outside of mainland China, according to recent media ...
6 months ago Silicon.co.uk
Fortifying iPhone Security: Stolen Device Protection & Essential Tips Amid Rising Theft Concerns - Numerous iPhones, often regarded as some of the best in the market, are pilfered daily on a global scale. Apple aims to address this issue with the upcoming release of iOS 17.3, introducing a feature called Stolen Device Protection. This security ...
6 months ago Cysecurity.news
Application Security Testing Explained - That's precisely why application security is a top priority for security teams and a crucial consideration for DevOps. Application security testing is like giving your software a thorough health check to ensure it's robust and resilient against cyber ...
5 months ago Securityboulevard.com
Apple's Anti-Theft Security Slows Down iPhone Crooks - Apple pushed out a security update for iPhone this week featuring a brand-new Stolen Device Protection for iPhone feature. Stolen Device Protection restricts the user's ability to make critical changes to the device settings when the device is not in ...
5 months ago Darkreading.com
Apple's new Stolen Device Protection has a big vulnerability. Here's how to fix it - Last week, Apple released iOS 17.3 with much anticipated updates such as Collaborative Apple Music Playlists and AirPlay hotel support. One of the biggest highlights was a new Stolen Device Protection; however, it's not as secure as we initially ...
5 months ago Zdnet.com
Product showcase: ImmuniWeb AI Platform - ImmuniWeb is a global application security company that currently serves over 1,000 customers from more than 50 countries. ImmuniWeb AI Platform has received numerous prestigious awards and industry recognitions for intelligent automation and ...
6 months ago Helpnetsecurity.com
What is Azure Identity Protection and 7 Steps to a Seamless Setup - As a result, tools such as Microsoft's Azure Identity Protection have become a staple in protecting against compromised identities, account takeover, and misuse of privileges. Azure Identity Protection is a security service that provides a robust ...
1 month ago Securityboulevard.com
What is App Security? SAST, DAST, IAST, and RASP. - Effective application security relies on well-defined processes and a diverse array of specialized tools to provide protection against unauthorized access and attacks. Security testing is a critical part of an application security strategy and should ...
6 months ago Feeds.dzone.com
Apple 'Find My' network can be abused to steal keylogged passwords - Apple's "Find My" location network can be abused by malicious actors to stealthily transmit sensitive information captured by keyloggers installed in keyboards. The Find My network and application is designed to help users locate lost or misplaced ...
7 months ago Bleepingcomputer.com
Key software patch testing best practices - To ensure a predictable rollout when a patch is deployed across your network, it is important to test it first in a nonproduction environment. Companies install software and firmware patches to fix bugs, remove vulnerabilities and add new features, ...
2 months ago Techtarget.com
How AI is revolutionizing "shift left" testing in API security - Catching coding errors in API preproduction, before they are spun up and go live is critical in preventing exploitable vulnerabilities. For developers who are not security experts, fixing code or knowing business logic abuse possibilities can be ...
7 months ago Helpnetsecurity.com
iPhone Triangulation attack abused undocumented hardware feature - The Operation Triangulation spyware attacks targeting iPhone devices since 2019 leveraged undocumented features in Apple chips to bypass hardware-based security protections. This finding comes from Kaspersky analysts who have been reverse-engineering ...
6 months ago Bleepingcomputer.com
Apple and Google add alerts for unknown Bluetooth trackers to iOS, Android - On Monday, Apple and Google jointly announced a new privacy feature that warns Android and iOS users when an unknown Bluetooth tracking device travels with them. Named Detecting Unwanted Location Trackers, the new feature started rolling out ...
1 month ago Bleepingcomputer.com
CVE-2021-22283 - Improper Initialization vulnerability in ABB Relion protection relays - 611 series, ABB Relion protection relays - 615 series IEC 4.0 FP1, ABB Relion protection relays - 615 series CN 4.0 FP1, ABB Relion protection relays - 615 series IEC 5.0, ABB ...
1 year ago
Google Chrome's new "IP Protection" will hide users' IP addresses - Google is getting ready to test a new "IP Protection" feature for the Chrome browser that enhances users' privacy by masking their IP addresses using proxy servers. Recognizing the potential misuse of IP addresses for covert tracking, Google seeks to ...
7 months ago Bleepingcomputer.com
A Comprehensive Guide to Penetration Testing in Public Clouds - As organizations increasingly migrate their operations to public cloud environments, the need for robust security measures has never been more critical. Cloud penetration testing emerges as a crucial component in ensuring the integrity and resilience ...
5 months ago Cybersecurity-insiders.com
Android to add new anti-theft and data protection features - Google is introducing multiple anti-theft and data protection features later this year, some available only for Android 15+ devices, while others will roll out to billions of devices running Android 10 and later. To protect your personal and ...
1 month ago Bleepingcomputer.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)