Security

Can I recover a forgotten iPhone restrictions passcode?

The purpose of iPhone restrictions is to lock certain functions of the device. They are also referred to as Parental Controls, capable of hiding songs with explicit lyrics, preventing YouTube from running, etc.

Without the four-digit passcode restrictions can't be changed. If you have forgotten your restrictions passcode you must restore your iPhone using iTunes to reset the passcode. When asked, do not restore the iPhone from backup, otherwise the old passcode you don't know will be enabled.

How do I set an iPhone password / passcode?

To protect your information in the event your iPhone falls into the wrong hands, set a passcode. If set properly, the iPhone passcode must be entered before the iPhone can be used.

1. Touch Settings -> Passcode -> Turn Passcode On
2. Enter a four-digit passcode
3. Re-enter the passcode for verification
4. Choose a time interval under Require Passcode
5. Select ON or OFF for the Voice Dial and Erase Data options

The shorter the Require Passcode time interval, the more secure your iPhone will be. Longer times mean longer spans during which unauthorized access can occur.

Personal Data Compromised by iPhone Worm

Jailbroken iPhones have been attacked again. iBotnet.A is the latest in a string of attacks to exploit the root password common to iPhones running SSH. The only way to insure security (besides NOT jailbreaking your iPhone) is to change your root password.

iBotnet.A (also known as Ikee.B or the "Duh" virus) spreads from iPhone to iPhone across the network sending personal data to a server located in Lithuania. Address ranges from service providers in Portugal, Hungary, Australia and the Netherlands have been targeted.

Malware Secretly Copies Private iPhone Data

Only days after the ikee worm was unleashed on Australian iPhone users a tool has been discovered that steals private data from jailbroken iPhones. iPhone/Privacy.A is a malware tool that runs on computers (or on an iPhone) and scans the Wi-Fi network for vulnerable iPhones.

After discovering and accessing the devices in range it copies all private data including SMS messages, videos, email, calendars, music, photos and all other app data to the computer. The program does all this without ever making the iPhone user aware of its intrusion.

Pages

Subscribe to RSS - Security