Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 10 November 2012

More iPhone Security Tips

Posted on 07:05 by Unknown
Important Points
• iPhone / iPad / iPod muggings are common.
• Reduce risk...
-- Minimize usage while in very public places.
-- Use iOS's security features...
---- for tracking a stolen device and remote wiping of data.
---- for preventing thieves from: turning off tracking, accessing data and accounts.
• If theft occurs, go to the police first, not the phone company. 
-- Police will try to track. 
-- Carrier will shut off service.
• Seal the SIM card with serial numbered security tape to detect tampering.

Setting tips via Martin Williams...
1. Select Settings.
2. Click General.
3. Select Restrictions.
4. Set a Restrictions passcode.
5. Click Enable Restrictions.
6. Look for Deleting Apps and toggle the switch from On to Off. This will mean that no one can delete an app such as Find My iPhone without your Restrictions passcode.
7. Scroll down the list of options until you reach the Privacy section, here you’ll find a link to Locations Services, click it.
8. Select Don’t Allow Changes. This will mean it is impossible for a robber to disable the Find My iPhone application from broadcasting your GPS. You will now need manually to approve all new apps to access your location data.
9. Go back to the main Restrictions menu and select Accounts, changing this setting to Don’t Allow Changes. This makes it impossible for a mugger to disconnect your iCloud account that connects to Find My iPhone.
10. If your iPhone is stolen, it is only going to transmit its location for as long as a SIM card is inserted and is active.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in advice, cell phone, privacy, Tips | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • Bugging Boss for a Raise Lands Three Employees in Jail
    China - Three public officials were each sentenced to 20 months in jail for illegally wiretapping a county Communist Party chief of central ...
  • Help The OSS Society Pass a Law (It's easy.)
    What is The OSS Society? The Office of Strategic Services Society celebrates the historic accomplishments of the OSS during World War II, t...
  • Holiday Shopping Safety Infographic
    Click to enlarge . Click to enlarge .
  • Columbia Engineers Make World’s Smallest FM Radio Transmitter
    A team of Columbia Engineering researchers... led by Mechanical Engineering Professor James Hone and Electrical Engineering Professor Kenne...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • New York Times - Quote of the Day - Tapped Out On Taps
    "I'm so jaded at this point that I'm not surprised. And from my perspective, let them all wear wires. Let's catch everybody...
  • DRTBOX and the DRT surveillance systems
    (Updated: November 29, 2013) In recently published screenshots from NSA's BOUNDLESSINFORMANT tool about France, Spain, Norway and Afghan...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ►  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ▼  2012 (84)
    • ►  December (33)
    • ▼  November (33)
      • The Smartphone Turns 20
      • Security Alert: Patch Your Samsung Printers
      • Everything You Need to Know About Shredding Sensit...
      • Police Strip Cut Shreds Used as Parade Confetti
      • TSCM Bug Sweeps: When, and When Not To - Part I
      • Spying Accusations Stoke America's Cup Rivalries
      • Is Your Cell Phone Protected by the 4th Amendment?
      • Mannequin Spies - Will Dummy Shoppers Revolt?
      • Bilateral Hotlines Worldwide
      • Patent Wars - VoIP Wiretaps
      • Spy College... for your 21st Century careers
      • From our "Persistence is Futile" file...
      • Student Balks at Stalk (Psst. Just make the tags m...
      • Holiday Shopping Safety Infographic
      • Defending Privacy at the U.S. Border: A Guide for ...
      • The Wall Street Wiretap Sword Of Damocles
      • Researchers Find iOS is Rich Target for Spying Sof...
      • Cyber Espionage Infographic
      • Commander Petraeus' phones
      • City Hall Fingered for Eavesdropping - Claims 'Ina...
      • What the Well Dressed Spy Wants for Christmas
      • Scientific Breakthrough Gives Paranoids Another Th...
      • 2012 China Report Released... no surprises.
      • This Week in Spy News
      • Email Security - The Petraeus Case
      • Watergate's Next Watergate
      • Get Alerts from your Local Police & 5,000 other Pu...
      • More iPhone Security Tips
      • Government Strength Mobile Spyware
      • Meet the Superheroes Fighting for Your Right to Mo...
      • A Salute to Our Native American Code Talkers
      • Security Quote of the Day
      • How to Surf the Web in Secret
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile