How to protect iPhones against ransomware attack?


I know that ransomware has been a problem in the Windows world for a while, but now it has reached iPhones, and apparently it will make them unusable unless you pay up hundreds of dollars. What should iPhone users do to prevent an attack like this on their device?

Topic: Security
Answer this Question


2 total
Vote Up (4)

Probably the easiest and most effective thing you can do is enable 2-step verification for your Apple ID.


1. Go to Apple ID website and sign into your account.

2. Click on "Password and Security."

3. You should see a heading for "Two-Step Verification." Click on the "get started" link. 

4. Follow the instructions there to set it up.

5. Note that there will be a few day delay before 2-step verification becomes active. Apple should send you an email telling you when it will take effect. 


Vote Up (2)

Ransomware worries? Turn off Find My Mac/Find My iPhone

"It's been a rough day Down Under; several iOS and Mac users have found their devices held "ransom" by a hacker leveraging Apple's Find My iPhone and Find My Mac services. Australia's The Age reports information acquired by recent security breaches, combined with the human tendency to reuse security credentials across services, may have led to the lockouts. The normally-helpful (or at least benign) Find My X services can indeed be used for ill, as Wired's Mat Honan learned last year to his regret.

It's noteworthy that iPhone users who have a passcode in place should be able to recover access, as long as the passcode was created outside of setting up Find My iPhone. In this post, I'll explain how to disable Find My iPhone/iPad and Find My Mac, as well as how to create a passcode on your iOS device. First, let's disable those services. Note that you must know your iCloud account information to turn off either of the Find My X services -- that's the point, really, as a thief presumably would not know your password and wouldn't be able to unlock or reinstall your purloined device with FMx turned on."

Ask a question

Join Now or Sign In to ask a question.
Some visitors to several high-profile websites last week were redirected to browser exploits that installed malware on their computers because of malicious advertisements on those sites.
Netflix has released three internal tools it uses to catch hints on the Web that hackers might target its services.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach
McAfee, part of Intel Security, has made improvements to its Server Security Suites portfolio with the introduction of performance optimisation and additional management efficiency to increase security for servers in physical, virtualised and Cloud environments.
The cybercriminal gang behind the Kelihos botnet is tricking users into installing malware on their computers by appealing to pro-Russian sentiments stoked by recent international sanctions against the country.
Future versions of the Firefox OS mobile platform will allow users to control application-specific permissions, a feature with both privacy and security benefits that's missing on Android.
A line of routers from a China-based manufacturer has a serious flaw that could allow a hacker to monitor someone's Internet traffic, according to research from Trend Micro.
Smartphones sold in California will soon be required to have a kill switch that lets users remotely lock them and wipe them of data in the event they are lost or stolen.
The U.S. National Security Agency built a "Google-like" search engine to give domestic and international government agencies access to details of billions of calls, texts and instant messages sent by millions of people, according to The Intercept.
Sony's PlayStation and Entertainment networks are back online after they were forced offline by a distributed denial-of-service (DDoS) attack, the company said late Sunday.