Magazine "iPad Welt" German stressed the need to use the code (code) lock with tablet computer "iPad" or smart phone "iPhone" in order to protect personal data from hacker attacks.
The magazine that the pirates have access to log on frequently always entered into the various Internet services data.
She said, "For example, if the use of e-mail and password themselves with all the online services, including Apple's identity Fbamkan pirates prevent the use of mobile devices with system" EOS "and a ransom demand for the re-run devices.
The same source added that the lock code is activated by the function "FIND My iPhone" (Find My iPhone) cloud computing service "iCloud".
It is supposed that this feature will help the real owner of the devices, "Apple" phones to find them in case of loss or theft.
There is also another major problem when Apple ID and password associated password in the hands of the pirates are located where they can access the "Apple" the whole account, including e-mail messages and store applications and store "iTunes" service cloud computing "iCloud" and others.
For these considerations advises the German magazine need to activate the safety function optional "two-stage" provided by the company "Apple" that assertion.
When you activate this function code is sent to the smartphone user's choice if he tried a unknown devices log in "Apple" servers, and if this procedure is carried out by the true owner of the device used in this case, will enter the code and continue to work.
On the other hand if the pirates are doing this procedure, the attempt will end at this point.
Categories
Popular Posts
-
the space agency and Aviation Administration (NASA) said that the asteroid with a diameter of half a kilometer, will pass on the relatively...
-
The United States is the primary source of electronic attacks on China in the year 2012, according to data from the Annual Conference of the...
-
Statistics revealed by the mobile carriers in China for the month of May / May last big expansion of the mobile market in China, which set a...
Subscribe to:
Post Comments (Atom)
Popular Posts
-
the space agency and Aviation Administration (NASA) said that the asteroid with a diameter of half a kilometer, will pass on the relatively...
-
The United States is the primary source of electronic attacks on China in the year 2012, according to data from the Annual Conference of the...
-
Statistics revealed by the mobile carriers in China for the month of May / May last big expansion of the mobile market in China, which set a...
0 comments:
Post a Comment