Kido Nursery Hackers Claim to Have Removed Stolen Data | Cybercrime

Cybercriminals who compromised the personal information and photos of thousands of nursery children have since removed the data following a public outcry.

The group responsible for the breach has erased details of children from the UK-based Kido nursery network.

Screenshots reviewed by the Guardian show that the child’s profile from the breach is no longer visible. Currently, the Kido logo is displayed with “More” under “More,” but sources in cybersecurity report that the link is non-functional, indicating that the data has been removed.

A spokesperson for Kido confirmed that the attacker had indeed deleted the previously exposed information.

The spokesman stated: “We are adhering to guidance from authorities regarding ransom payments to prevent incentivizing further criminal activities. We are collaborating closely with families, regulatory bodies, law enforcement, and cybersecurity experts to ensure our data is permanently removed.”

The BBC first reported on the data deletion and mentioned a hacker who expressed remorse, stating, “I’m sorry for hurting the child.”

Targeting children has drawn widespread condemnation, with cybersecurity experts labeling the breach as “crossing a line” and “testing ethical boundaries.” A parent of a child at Kido in London remarked that the hackers were “sinking to new lows.”

The Guardian has also found indications of notorious gang members in underground cybercrime forums being advised by their peers to avoid attacking minors.

On Wednesday, members of Nova, a faction that offers hacking services to other criminals, cautioned a persona named Radiant on an anonymous Russian forum, saying, “reputation matters, so do not target children.” Radiant responded, “We have not been allowed to cease any operations concerning them,” adding, “data of those under 19 who attended has been deleted.”

The leak site and forum posts were documented by analysts at the cybersecurity firm Sophos.

Hacking teams are acutely aware of the impact of negative publicity, which can lead to increased scrutiny from law enforcement and disrupt internal relationships within the hacking community.

Sophos researcher Rebecca Taylor noted: “Even criminals understand that there are lines they shouldn’t cross. We have discovered that stealing data from minors not only draws attention but also damages credibility.”

Taylor emphasized, “credibility is crucial” for groups that demand ransoms for stolen information. The BBC reported that Radiant had sought £600,000 in Bitcoin from Kido for the return of the data, but Kido refused to comply.

“The deletion of data was not an act of benevolence, but rather a move for damage control. This was an unusual instance where morality and self-interest briefly aligned,” Taylor remarked.

However, the revamped Radiant Leak site, a portal for such data, appears to be more user-friendly, featuring a search bar to locate companies targeted by the group and contact information through TOX, an encrypted messaging platform.

Radiant demonstrates proficient English in communication, but analysts suspect this group may not be Western-based. Most ransomware groups originate from former Soviet states. Analysts believe that Radiant may represent a new entity in the cybercrime landscape.

Before the data was deleted, one woman informed the BBC that she received a threatening call from a hacker who claimed they would publish information about her child online unless she pressured her child to comply with ransom demands. Kido operates 18 locations in London, along with nurseries in the US, India, and China.

Radiant boasted about having sensitive information on over 8,000 children and their families, including incident reports, protection records, and billing information. All Kido nursery locations in the UK reported being affected by the breach.

One cybercriminal told the BBC: “All child data has been removed. There is nothing left, and this should reassure parents.”

Source: www.theguardian.com

This Unusual Underwater “Blue Dragon” Battles Stolen Jellyfish Venom

Far from the shore, in the immense stretches of the open ocean, resides an uncommon assembly of creatures known as “Neustons.”

This environment is a vast, two-dimensional layer of the ocean that bridges the atmosphere with the sea.

Among this group, one of the most fascinating beings is the blue dragon, a kind of sea slug, or naujibrance, more widely recognized as the blue dragon, the sea swallow, or Glaucus atlanticus.

Blue dragons float on the surface, buoyed by the air bubbles they have ingested. To evade predators, they employ a unique biological strategy called countershading.

The underside of their body, positioned upside down, exhibits a bright blue hue that camouflages it against the ocean below, concealing it from aerial hunters above.

Conversely, the side that hangs from the surface boasts silver stripes that mimic the shimmering ocean surface, aiding swimming predators in their upward gaze.

Overall, the blue dragon appears peculiar owing to its sea slug nature. The main body, measuring about 3cm (0.4 inches), seems somewhat sluggish, but it features elongated appendages resembling fingers of varying lengths.

These appendages are not used for waving or swimming; they are anatomical structures called ceratha, essentially serving as a secondary gill by extending the intestines and respiratory system to facilitate breathing.

Like many sea slug species, the Blue Dragon utilizes its ceratha as a weapon. They are notorious hunters, primarily targeting other blue-hued Neustons, including Portuguese man o’ war (Physalia physalis) and jellyfish-like creatures like blue buttons (Porpita porpita) and by-the-wind sailors (Velella velella).

Blue dragons can inject venom into these organisms without fear of being stung.

‘They are vicious hunters, and their main prey is the other members of Neuston’ – Photo credit: Matty Smith Photo

Remarkably, these sea slugs can recycle their prey’s toxins, maintaining them intact and incorporating them into their ceratha.

When threatened by predators, they can launch these toxins as a potent defense mechanism.

Modern challenges pose threats to Blue Dragons and their fellow Neuston inhabitants. A study conducted between Hawaii and California reveals that they inhabit the same remote regions of the infamous Pacific Ocean, including the Great Pacific Garbage Patch, where floating plastic debris accumulates due to swirling ocean currents.

One approach to combat this plastic pollution involves placing a net between two vessels to retrieve debris from the surface. However, this method could inadvertently capture a significant number of Neustons.

The complete ecological consequences of this method remain unclear, but it may have significant repercussions on the marine food web. These creatures serve as crucial food sources for a variety of marine species, such as sea turtles and seabirds.


Please email us to submit your questions at question@sciencefocus.com or message us on Facebook, Twitter, or Instagram Page (please include your name and location).

Check out our ultimate Fun fact More amazing science pages


read more:


Source: www.sciencefocus.com

What to Do If Your Laptop Is Lost or Stolen: Essential Tips for Tough Situations

lAptops are essential tools, housing countless important documents, images, and cherished memories. Losing them is about more than just work interruptions. Here’s what to do if the unfortunate occurs:

What should I do if my laptop is lost or stolen?

  • Try to locate it using Microsoft or Apple’s Find My services. Lock it remotely and mark it as lost to safeguard your data.

  • Remove it as a trusted device from services like your Apple or Microsoft account, cloud services, online shops, or other browser apps.

  • Change the password for your primary accounts, such as your Apple or Microsoft account, starting with email accounts that a thief might access through password resets.

  • In the UK, call 101 to report the theft to the police, providing details like the laptop’s make, model, color, and serial number.

  • Reach out to your insurance provider. If you have coverage, your laptop might be included in some home contents policies.

  • Inform your bank about credit cards that might have stored information on your laptop.

  • Contact the laptop’s manufacturer to report the theft and request to blacklist the serial number.

What should you do immediately after getting a new laptop?

Once you acquire a replacement laptop (whether new or used), there are several precautions you can take to ensure its safety.

  • Establish strong passwords or long pins that are difficult to guess. Enable and utilize face or fingerprint recognition, and ensure your laptop locks the screen after a brief period or when the display turns off.

  • If not already activated, enable device encryption in the Privacy and Security Settings.

  • Set up two-step verification for your Microsoft or Apple account, along with any other accounts you use.

  • Activate “My Device” in the Windows 10 or 11 Security Settings or in iCloud Settings on Mac. This helps you locate a lost laptop, lock it remotely, and display a lost message to anyone who finds it.

  • Regularly back up your data. On Windows, you can use Windows Backup to save files and settings, or utilize Microsoft’s OneDrive Cloud Service (5GB free). For Macs, use Time Machine to back up to an external drive, and sync iCloud with apps and files (5GB free). Alternatively, copy files to an external drive but ensure sensitive documents are encrypted before backup.

  • Store important documents in the cloud. Microsoft and Apple offer cloud services, but there are numerous alternatives, including Google Drive, Dropbox, and Proton Drive.

  • Keep your proof of purchase secure, and remember your laptop’s color, model number, and serial number.

  • Consider insuring your laptop under your home contents policy. You may need to add it to a list of high-risk or high-value items, especially when leaving home. Alternatively, seek dedicated laptop or gadget insurance, which often includes theft protection.

Source: www.theguardian.com

What to Do If Your Wireless Headphones are Lost or Stolen: Helpful Tips

Headphones are common accessories for many people, but they have also become a prime target for thieves. Whether they’re snatched from your head or taken from your bag, here’s how to handle it.

What to Do If Your Headphones Are Stolen?

  • Check the headphone management app on your phone. Many have features that show where the headphones were last connected, allowing you to track them down.

  • Be sure to check Bluetooth models like Apple’s AirPods, Samsung’s Galaxy Buds, and Google’s Pixel Buds. They often have a “find my device” option, in case someone finds them.

  • Report the theft to the police using the non-emergency number 101, providing details such as make, model, color, and serial number.

  • Reach out to your insurance company to find out if your headphones are covered under any policy.

What to Do As Soon As You Get a New Pair

Getting replacements or new headphones can alleviate concerns about future theft or loss.

  • Install a headphone management app on your phone and enable location tracking.

  • Add your headphones to the “find my” feature on Apple or Google if they’re compatible.

  • Consider using Bluetooth trackers like Apple’s AirTag, Tile, or Samsung SmartTag with your headphones or their case.

  • Note down your headphones’ make, model, and serial number, keeping this information safe along with your proof of purchase.

  • Think about having your headphones engraved with your name; this option is often available at the time of purchase.

  • Explore where to wear your headphones and utilize noise-cancelling features that might help you notice if a thief tries to take them while you’re using them.

Source: www.theguardian.com

Lost or Stolen Smartphone: Practical Steps to Regaining Peace of Mind

Smartphones are essential in today’s modern life, containing everything from photos and messages to credit cards and bank accounts. Losing or having one stolen can be a nightmare beyond the monetary value of the device.

If this unfortunate event happens to you, taking the following steps can help safeguard your data, prevent fraud, and possibly even lead to the recovery of your phone.




Losing or having your smartphone stolen can be a major inconvenience. Photo: Chris Root/Aramie

Steps to Take as Soon as You Realize Your Phone is Missing

  • Locate and track your phone using Apple’s Find My iPhone or Google’s Find My Device feature if it’s turned on. You can do this from a computer, tablet, or another smartphone.

  • Use the tracking feature to remotely lock and mark your phone as lost, protecting your data and preventing unauthorized transactions. You can also remotely erase the device if necessary.

  • Contact your network provider to block the SIM card and suspend any billing activities. Make sure to disable any payment features linked to your phone.

  • Notify your credit card company to disable any cards stored on your phone for Apple Pay or Google Pay.

  • Report the theft to the police and provide them with your phone’s IMEI number, which can be found in your Apple or Google account settings.

  • Contact your insurance provider if you have coverage for lost or stolen phones.

  • Change the passwords for your important accounts, starting with your email to prevent unauthorized access.

  • Remove your phone from all accounts and services to prevent unauthorized access to your personal information.

Actions to Take When You Acquire a New Phone




Setting up security features on your new phone can prevent future incidents of loss or theft. Photo: VladySlav Yushynov/Alamy

When you get a new phone, take the following precautions to ensure the safety of your data and device:

  • Set strong PINs, short screen lock timeouts, and enable biometric authentication to secure your phone from unauthorized access.

  • Familiarize yourself with the phone’s settings to enable remote tracking, locking, and erasing in case of loss or theft.

  • Activate theft protection features such as Stolen Device Protection for iPhone or Theft Protection for Android to safeguard your sensitive data.

  • Secure your SIM card with a PIN to prevent unauthorized use or transfer to another device.

  • Make note of your phone’s IMEI number for identification purposes.

  • Utilize biometric authentication for banking and sensitive apps to enhance security.

  • Disable certain settings and features to prevent unauthorized access to your phone and data.

  • Backup your device’s data and settings using cloud services to protect your information.

Source: www.theguardian.com

Scammers Use Stolen Money to Buy “Sim Farm”, High Heels, and Zombie Knife

oThe NA shelf between the Alexander McQueen shoes, Louis Vuitton handbags and Versace heels in the police evidence room is an 18-inch machete and a serrated zombie knife. According to DCI Paul Curtis, the tools needed to achieve that are in addition to expensive fashion purchased along with serious fraud revenue.

“These are serious criminals, and for some reason they felt the need to have these to protect themselves,” he says. Another tool is “Sim Farms” purchased from Dark Web. This is used by scammers to send many text messages at once. Laptop stack. Mobile phone and payment card reader.

The corruption of tools and crime comes from raids led by dedicated card and payment crime unit (DCPCU). observer I visited this month. Taking responsibility for revealing payment fraud across the country and charging the perpetrators, London and a group of police officers from the metropolitan police are at the forefront of the fight against fraud.

Some of their recent successes are Bank staff and Police officer To fraud the people and the Chinese Running along the west edge of London, sending fake text messages From the machine in his car.




DCI Paul Curtis says fraud is “underreported and causes great harm.”

The National Crime Agency (NCA) estimates that 40% of crimes are fraud-related. It places the amount lost to billions of people each year. Revealing the criminals behind payment fraud is a difficult struggle.

There are many problems. Criminals are often based overseas and take advantage of the constant advancement in technology that dupes victims. But one difficulty is simple and common. This means that people are so embarrassed that they fell for fraud that they can’t mention it to those around them. “It’s underreported and causes great harm,” Curtis says. “And the harm is not just financial.” Victims can lose their sense of self-confidence and create mental health issues, which can even lead to suicide.

“It’s really challenging to overcome people’s own embarrassment and shame,” he says. “It’s about getting comfort and communicating to people from that network around you, like from your family. [and] From your social network. And if people have that support, it can be very empowering to them [they can] They then report and engage with law enforcement. ”

Guardian Recently, we have revealed details of sophisticated mercenary tactics used by scammers in an elaborate business based in Tblisi, Georgia. Many were called again and again by criminals, and more and more persuaded to hand over money.

Curtis says criminals in fraud cases use similar methods to criminals who are sexual predators when grooming victims. “It works exactly the same as a scammer. They have to build confidence with the victim. They have to build that trust. So this may not be a quick process to become a victim of a scam,” he says.




Louis Vuitton’s bag was seized in the assault

Technological advances present a continuing problem with the DCPCU. Money can now travel across borders at a much faster rate than before, leaving it out of reach of law enforcement, and ads for fake investment vehicles are often praised for being supported by celebrities like those that happened in MoneySavingexpert’s Martin Lewis.

According to Bendaldson, managing director of economic crime for the UK Finance Association, a banking organization that funds the DCPCU, artificial intelligence can use patterns to create text, images or videos on existing data – the development of a generation AI that gives criminals new opportunities.

“I think it gives [criminals] There are a variety of features they didn’t have before, and… some of this technology is easy to use and easy to use.

“It’s much easier to do that [fraud] In a very convincing way [as] There are now a variety of capabilities available to criminals, changing the nature of the threat. Admission bar [with] That type of technology is always low,” Donaldson says.

Which of the UK’s finances and consumer groups this month? I wrote a joint letter to the British government They ask technology companies to “robust action” to offset the increased costs of fraud.

Donaldson says the majority of approved push payments (APP) scams involve training someone to voluntarily send money from a bank account. The decision announced in January to remove fact checkers and reduce censorship by Facebook raises concerns that it will make it even easier for criminals to exploit people, he says.

Police are seeking more effective user verification to prevent criminals from operating anonymously, and to share more information that can identify them.

Meta, the parent company of Facebook, Instagram and WhatsApp, says it has begun mutual exchanges of fraudulent information. This allows banks to share information about fraud. This has deleted 20,000 accounts. Tiktok says each request for data from police will be investigated and evaluated before data is disclosed.

So, when scams swell and come to people through emails, texts, WhatsApp messages, and many social media channels, what can people do to stay safe?

Donaldson handles your personal information the same way you handle keys in your home. “Please do not hand over any aspect of your personal information unless you trust someone with the door key.”

Source: www.theguardian.com

Hyundai Motors facing legal action over easily stolen cars

Hyundai, a motor maker, is currently facing legal action due to allegations that one of its most popular electric vehicle models can be easily stolen in seconds. Digital security expert Elliot Ingram was shocked to see CCTV footage of a hooded burglar stealing his Hyundai Ioniq 5 in under 20 seconds from his home.

It is believed that the thief used devices available online to replicate the car’s electronic key. This incident is just one of many thefts involving this vehicle, with many owners now resorting to steering locks for added security. Ingram’s car was eventually recovered by the police, but he has decided to terminate the lease and is seeking compensation from the car company. He argues that the Korean automotive giant should have informed customers about the security vulnerabilities.

“The security system is completely compromised, making it susceptible to attacks by anyone,” he stated. “It’s no longer effective.”

Hyundai has been promoting the convenience of digital and smart keys, allowing drivers to lock/unlock the door and start the engine with just the key fob or digital key. While the new technology includes various security measures, criminal groups have found ways to bypass them.

Ingram discovered a key emulator device being sold online for 15,000 euros. This device resembles Nintendo’s Game Boy Game Console and can operate in English or Russian. It has the capability to record signals from the car and replicate them within seconds, allowing for easy unauthorized access. Last year, the automotive industry admitted to ignoring warnings over a decade ago regarding the risks associated with keyless technology and vehicle theft.

Hyundai has responded by stating that there is an industry-wide issue with organized criminal groups using electronic devices to bypass smart key lock systems. They are collaborating with law enforcement to better understand these devices and track stolen vehicles. The company is working on an update to reduce the risk of keyless theft for vehicles sold since February 2024 and is planning to provide retroactive action for earlier models.

Vehicle theft has been on the rise in the UK and Wales, with a significant increase in the use of remote devices by criminals. Legislation is being introduced to ban electronic devices used for keyless vehicle theft, with severe penalties for those found in possession of, manufacturing, importing, or distributing such devices.

In conclusion, Hyundai is focused on enhancing vehicle security to combat theft, but they do not plan to recall the vehicle. Despite the updates and measures being implemented, the company acknowledges the challenge posed by determined criminals who will stop at nothing to steal vehicles for various purposes.

Source: www.theguardian.com

Reclaiming the Stolen: Looty’s Bold Mission to Return the Rosetta Stone

ILast March, two men in tracksuits, hockey masks and matching laundry bags headed to the British Museum. Just outside, police on patrol asked two strange-looking men where they were going. “We’re going to the British Museum to loot the stolen goods,” one of them said. “See you there then!” replied the policewoman.

However, no arrests were made as nothing incriminating occurred. What actually happened was that one of the British Museum’s most famous objects, an artifact that, according to Egyptologist Monica Hanna, is a “symbol of Western cultural power” and “a symbol of British imperialism,” Rosetta’s “digital It was a robbery. stone.

The robbers, along with Hanna, who they had invited with them, went to the exhibit room where the stone monument was displayed and created a detailed 3D scan of it on an iPad. This effectively provided “looters” with a completely legal digital copy of the 196 BC artifact. But their goal is not just to digitize the Rosetta Stone, but to use location-based augmented reality technology (or geo-AR) to locate the Rosetta Stone in its place of origin, Rashid (or Rosetta) in Egypt. The idea was to return the images to local people and make them available for viewing. Send objects from your smartphone.

The two men behind the masks were Chidi Nwaubani and Ahmed Abokor, London-based product designers and creative consultants, respectively. Together they are booty, a radical “artist” collective and technology company founded in 2021, whose purpose is to “loot” cultural artifacts stolen from museums. First, we 3D scan them and then share them as enhanced digital artwork through non-fungible tokens (NFTs).

Because NFTs provide public proof of ownership of digital files, Looty’s method of “stealing” and redistributing works of art is connected to the lack of transparency often associated with institutions founded in colonial times. The aim is to challenge the fading of. The British Museum was embroiled in a scandal in August last year, when it was revealed that around 2,000 artefacts were stolen due to poor record-keeping, and that around half of its collection of around 8 million items had not been fully catalogued. However, the museum, which was founded in the 18th century, is once again facing scandal. public calculation.

“They’re less interested in the artifact and more concerned with the fact that they have it,” Abokor said. “Once again, it’s all about power.”

From organizing one of the main things interactive exhibit From its exhibition at the Venice Architecture Biennale last year to its installation at NFT Paris this February, Looty is taking the world of art and technology by storm. In November, they special projects department 1-54 Contemporary African Art Fair. Continuing his Rosetta Stone heist project, Abokor had created a replica of the Rosetta Stone wrapped in cloth and rope. Visitors can scan the stone using the QR code included in the piece’s description, which activates an animation on their mobile phone for an augmented reality (AR) experience that shows Rosetta’s Stone in its true size and glory. became.

Nwaubani and Abokor’s partnership dates back nearly 20 years, when they met at university in London and bonded over a shared creative spirit and African heritage. Nwaubani grew up mainly around Guildford and developed her interest in technology early by “coding her games on computers with floppy discs”. However, she experienced severe racism at school and her father, a university professor from Nigeria, forced her to change schools.

Born in Somalia, Abokor was just 12 months old when his family moved to Sweden and ended up living in a refugee camp. “Having lived through war, it is ingrained in us to understand politics and know what is going on around us,” he says.

They recall that when they were young, their parents would give them an “alternative” history lesson in European museums, explaining where objects “really” came from. This helped cultivate their curiosity about Africa’s rich and often misrepresented history, and taught them that power and politics are deeply rooted in art.

Nwaubani first came up with the idea for Looty around Christmas 2020. The group is named after Queen Victoria’s Pekingese dog, which British soldiers looted from the Summer Palace in China in 1860. Read the report The results revealed that 90-95% of Africa’s cultural heritage is housed in major museums outside Africa. Inspired by the NFT boom, Nwaubani conceived the project “around the idea of ‘Can we take back something that has already been stolen?'”

The technology that helps make this concept of digital looting and repossession a reality is Lidar, a form of 3D scanning that stands for “Light Detection and Ranging” and uses eye-safe laser beams to see the world in 3D. “You can see. Lidar allows Looty to digitally record artifacts and render them in 3D. She then made them available on the blockchain as her NFTs, doing what Nwaubani describes as a “counter-imagination of the original” and cutting through the bureaucratic bureaucracy that prevents people in developing countries from seeing these works of art in person. avoid unnecessary processes.

Before Rosetta, their first project was Benin bronzes. This is another hotly debated colonial relic that dots Western museums. Looty has released a limited collection of 25 bronze NFTs based on the head of an oba (king) looted from the British Museum. 20% of each sale goes to the Looty Fund, which gives grants to young African artists, especially Nigerian artists.

Skip past newsletter promotions

What they discovered is that the museum world is still adapting to the era of massive digitization. The British Museum says on its website that it allows 3D photography and printing of objects for non-commercial purposes and asks visitors to “exercise caution and respect” for “culturally sensitive” objects.

“When the British army attacked the Kingdom of Benin, [in 1897] There was no law prohibiting it. Otherwise, we will legislate to legalize it,” says Nwaubani. “We are now in a time where there are no laws regulating our actions.”

“And technology advances faster than the law,” Abokor added.

Source: www.theguardian.com

VF Corp., owner of Vans and Supreme, reports stolen personal information and affected orders in alleged ransomware attack

US-based VF Corporation, which owns apparel brands such as Vans, Supreme and The North Face, said a cyberattack affected its ability to fulfill orders ahead of Christmas, one of the year’s biggest retail events. admitted that he had caused it.

A company based in Denver, Colorado said in a filing with federal regulators. The cyberattack, which the company first detected on December 13, was a ransom attack in which hackers “disrupted the company’s operations by encrypting some IT systems and stole data, including personal data, from the company.” It was said that it was hinting at a software attack.

As a result, the company says its operations continue to be disrupted, including its “ability to fulfill orders.”

When TechCrunch tried to place an order on Vans’ website, he was greeted with the following message: You will be notified by email when your item is shipped and can track it with the sender. ”

VF Corporation said in a filing that the retail stores it operates around the world are open and consumers can purchase available products online. It is unclear when orders will be shipped, and a company spokesperson did not provide a timeline.

VF Corp. spokesperson Colin Wheeler provided TechCrunch via email with a statement reflecting the company’s regulatory filings. The company did not respond to TechCrunch’s questions about the incident. Reveal whether the company received a ransom demand from hackers.

The company has not yet disclosed how it was breached, what type of data was accessed, or how many individuals were affected by the breach, including employees, customers, or both. . It’s also unclear who is behind the attack, with the ransomware group being tracked yet to claim responsibility.

VF Corp. warned in a regulatory filing that the cyberattack would have a “significant impact” on its business until its systems are restored. “As the investigation into the incident is ongoing, the full scope, nature and impact of the incident is not yet known,” the filing states.

VF Corp disclosed the incident on the same day that the U.S. Securities and Exchange Commission’s new data breach disclosure rules went into effect. This regulation means that organizations must report cybersecurity incidents, including data breaches, to federal securities regulators. within 4 business days.

Source: techcrunch.com

Apple’s latest update includes security measures to protect stolen phones from hacking attempts by thieves

This is the perfect protection against hacking attacks.

Have you ever felt dizzy thinking your phone might be stolen? There’s no need to worry. Apple has devised a powerful new weapon in the fight against cybercrime. It’s a new IOS update called Stolen Device Protection that prevents thieves from accessing your smartphone with stolen passwords.

“In rare cases, a thief can steal your device by watching you enter your passcode, but Stolen Device Protection adds a sophisticated new layer of protection,” an Apple spokesperson said, says the person. said in a statement.

This bold new security feature, released Tuesday as an iOS 17.3 developer beta, is especially useful when users change their Apple ID password, remove Face ID, or remove other sensitive features. , requires the use of a biometric access code such as a face or fingerprint.

Whenever a user’s device is in an unfamiliar location, stolen device protection is initiated and the user is then required to complete the aforementioned protocol.


“In the rare case that a thief steals your device by watching you enter your passcode, Stolen Device Protection adds a sophisticated new layer of protection,” an Apple spokesperson said. Masu. Denphoto – Stock.adobe.com

As an additional safeguard against “smash-and-grab” operations, users must re-enter their data after an hour to confirm the change, effectively rendering any passcode hacking attempt futile.

Stolen Device Protection is currently only available to beta testers, but will be available to all users once Apple releases the final version of iOS 17.3. TechCrunch reported.

An Apple spokesperson said the move is part of an ongoing campaign to protect smartphone users “as threats to user devices continue to evolve.”

Last month, the release of a new iPhone feature, NameDrop, set off alarm bells. This allows a user to instantly share contact information with his iPhone or Apple Watch nearby, instead of physically handing the phone over to someone.

While it did speed up the information exchange process, viewers became concerned that users were unknowingly sharing their information with unknown iPhone users.

Source: nypost.com