247 Detectives

Please Call NOW 0845 520 4121 / 07017 411 007

Please Call NOW 0845 520 4121 / 07017 411 007

Content Area 1

1st Call Detectives Blog

Get the latest information & news from the industry...

Archive +

Tags

Archive by Date

More iPhone unlocks as Apple battles the FBI

by Josef Kafka

While the privacy battle rages in the United States, and the FBI seeks more help from Apple when it comes to unlocking devices of suspected criminals, the LAPD managed to break into an iPhone 5S without any high profile assistance. The high profile case concerns actor Michael Jace, accused of killing his wife (http://www.latimes.com/local/lanow/la-me-ln-lapd-locked-iphone-actor-wife-michael-jace-20160504-story.html). All the police are saying is that they used the services of a forensic mobile phone expert who managed to override the iPhone's locking functions to help them investigate the couple's relationship.

The Apple vs FBI arguments have quietened down recently, but the media and pundits are still weighing in on the debate with notorious security whistleblower Edward Snowden calling on the Feds to reveal how they did it (http://appadvice.com/post/snowden-thinks-the-fbi-should-disclose-its-unlocking-method-to-apple/712282). That was during a TV debate of privacy and security, focused on "The government should have lawful access to any encrypted message or device" and is well worth watching if you want to understand the bigger issues. 

The latest threats against Apple users

These latest developments come as all Apple UK users face a new privacy threat, from the usual criminal sources. People are receiving a text message, warning them that their account is suspended and asking them to confirm their Apple iCloud details. A link in the text message takes them to a fake but convincing website, where some users are giving up their Apple login information. This gives hackers free rein on their data, iTunes purchases and other information. Criminals can use this data to send gift cards to their own accounts, simply steal any useful files or delete your data. 

This is a fairly typical type of attack, but pretending to be a text from Apple may confuse some users. Apple's advice for scam emails is pretty much the same for SMS and other forms of fake contacts (https://support.apple.com/en-us/HT204759) – generally no company with your information will ever ask you to confirm all your details, either over the phone or online. 

It highlights the need for constant vigilance when it comes to giving user credentials and information out, and should act as a sign that all users should toughen up their security. This can mean ensuring all websites use HTTPS:// headings to ensure a secure link between the user and a website. People who work remotely via PC or mobile device should use a virtual private network (VPN) to connect to their work servers to protect work data and login details from being spied on by hackers or governments, who are still hoovering up large quantities of data. These precautions add a minimum of inconvenience to the process and will help protect your information. 

Staying protected anywhere

These best practice tips are vital when accessing the internet from cafe, library or other public Wi-Fi hotspots. That's especially true when travelling abroad as they are common targets for criminals to eavesdrop on data by taking control of the hotspot router, and in some countries the government will most definitely be watching whatever it is you do. Some basic tips include checking with the establishment what the name of their router is, so you don't log onto a different one, which may well be used to fool tourists or business travellers. Use a VPN to connect to any essential services like online banking or business tools, and before you even leave, ensure your phone or PC passwords are set to something strong. 

Some people even use their smartphone as a mobile hotspot, but beware of large data bills for working like this. If it is a personal phone, be aware of your data plan limits and keep tabs on usage to make sure you don't suffer from bill shock. As well as data, people also need to protect their voice and messaging communications, there are many apps for this from Skype to WhatsApp, but users need to ensure the service they use is secure and information is not stored on cloud servers where others could access data. Users should also ensure a phone tracking feature or app is installed, so they can locate their device if it is lost or stolen. 

All of these pressures to be safe add a growing number of steps that users must take to reasonably safeguard their data and personal information. By following this advice, you decrease the risk of data theft, but it cannot be eliminated entirely. Stealing an in-use or unlocked phone is now a preferred way for criminals to access data or steal files, all they need to do is stop the device locking, by regular tapping. That sort of event few people are prepared for, but many devices now have a remote wipe option to prevent data from being stolen. 

All of these threats line up against any user, who may be targeted indiscriminately or as part of some bigger plot, but everyone needs to take as many precautions as they can to stay safe.

Leave a comment
Areas & Postcodes We Cover
  • NW7, NW9, NW4, NW11, NW2, NW10, NW6, NW3, NW8, NW5, NW1, N20, N12, N3, N2, N10, N6, N8, N19, N7, N1, N5, N4, N16, N15, N17, N18, N11, N14, N21, N9, N13, N22 
  • E4, E17, E18, E5, E10, E11, E8, E9, E2, E1, E14, E3, E16, E6, E13, E15, E7, E12, SW6, SW10, SW5, SW7, SW3, SW1, SW14, SW13, SW15, SW20, SW19, SW18, SW17, SW16, SW12, SW2, SW9, SW8, SW11, SW4
  • EC4, EC1, EC2, EC3, SE1, SE11, SE17, SE16, SE5, SE15, SE14, SE8, SE24, SE22, SE4, SE21, SE23, SE26, SE20, SE25, SE19, SE6, SE12, SE9, SE18, SE2, SE28, SE7, SE10, SE3, SE13 
  • W1P W1M W1N W1R W1S W1T W1U W1V W1W W1X W1Y W1K W1J W1H W1A W1B W1C W1D W1F W1G W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
     
  • © All rights reserved 2014 '1st Call Detectives'
  • /
  • Website designed & devloped by evokeu