Lock code protects the "Apple" devices from pirate attacks

Magazine "iPad Welt" German stressed the need to use the code (code) lock with tablet computer "iPad" or smart phone "iPhone" in order to protect personal data from hacker attacks.
The magazine that the pirates have access to log on frequently always entered into the various Internet services data.
She said, "For example, if the use of e-mail and password themselves with all the online services, including Apple's identity Fbamkan pirates prevent the use of mobile devices with system" EOS "and a ransom demand for the re-run devices.
The same source added that the lock code is activated by the function "FIND My iPhone" (Find My iPhone) cloud computing service "iCloud".
It is supposed that this feature will help the real owner of the devices, "Apple" phones to find them in case of loss or theft.
There is also another major problem when Apple ID and password associated password in the hands of the pirates are located where they can access the "Apple" the whole account, including e-mail messages and store applications and store "iTunes" service cloud computing "iCloud" and others.
For these considerations advises the German magazine need to activate the safety function optional "two-stage" provided by the company "Apple" that assertion.
When you activate this function code is sent to the smartphone user's choice if he tried a unknown devices log in "Apple" servers, and if this procedure is carried out by the true owner of the device used in this case, will enter the code and continue to work.
On the other hand if the pirates are doing this procedure, the attempt will end at this point.

0 comments:

Post a Comment