

- #BUSYCAL APPLE APP SPECFIC PASSWORD VERIFICATION#
- #BUSYCAL APPLE APP SPECFIC PASSWORD CODE#
- #BUSYCAL APPLE APP SPECFIC PASSWORD SERIES#
Indeed, it’s a bit of a stretch for Apple to say that 2SV now “protects all of the data you store and keep up to date with iCloud” when, in fact, it only protects your very first login with a new device. This is a good move, and we want to express public thanks to Apple for responding so quickly.īut we’ll also offer the opinion that the company still hasn’t got 2SV right.
:max_bytes(150000):strip_icc()/010-how-to-sync-your-calendar-with-alexa-420d3e77b8e3455ca0bbf22aa00db89f.jpg)
The FAQ (which is article HT5570 in Apple’s knowledgebase) has been updated accordingly:
#BUSYCAL APPLE APP SPECFIC PASSWORD VERIFICATION#
For more information, read the Two-Step Verification FAQ. Starting today, in addition to protecting your Apple ID account information, two-step verification also protects all of the data you store and keep up to date with iCloud. Two-step verification now protects iCloud

This email provides information about recent updates to your service. Thank you for using two-step verification to protect your Apple ID.

Nearly 95% of you said, “Yes.” Apple pays attentionĪnd Apple, it seems, was listening, sending out an email late yesterday Cupertino time (T018:00-7) to its 2SV users: So we ran a poll, asking whether Apple should change its mind and extend 2SV to iCloud. Turning on 2SV only protected certain operations on your Apple account, such as editing your account details or buying products from iTunes or the App Store from a new computer or device. 2SV not enoughĮxcept that 2SV didn’t apply to iCloud at all, as Naked Security writer Chester Wisniewski went out of his way to check.
#BUSYCAL APPLE APP SPECFIC PASSWORD CODE#
Two-step verificationĪpple’s response, as we reported at the time, was to urge iCloud users to turn on its two-factor authentication system, known as two-step verification (2SV).ĢSV augments your password with a one-time login code sent via SMS:Įven a crook who knew your Apple ID password wouldn’t have enough to get into your account and restore your iCloud data onto his computer.Īlso, if you were to see SMS verification codes popping up when you didn’t expect them, you’d have an early warning that someone was trying (and failing!) to breach your account So phishing your Gmail password would get them into iCloud, or vice versa. → Remember, re-used passwords make the problem worse: if you have one password for all your accounts, the crooks can breach any one of them and that’s that. So stolen, phished, keylogged and otherwise illegally acquired Apple ID passwords are a better explanation for the iCloud-related celebrity selfie breaches than a problem in iCloud itself.
#BUSYCAL APPLE APP SPECFIC PASSWORD SERIES#
He seems to have accumulated them in a series of underground trades and purchases. The photos were apparently stolen from multiple sources in various ways, but released as a job lot by a collector. We’re delighted to hear it! Bogus blame of iCloud in nude photo scandalĪt the start of September 2014, a scandal broke when illegally-collected nude photos of 100 celebrities were published online.Įarly rumours suggested that this might be down to some sort of iCloud “hack,” because at least some of the photos had been stolen from iCloud accounts, and because the photos all appeared at once, as though they had been grabbed as a job lot. The company backed down over the “foistware” U2 album that you recently received via iTunes, like it or not.Īnd later the same day, it announced that its two-step verification system would be applied to iCloud, effective immediately. Apple really is listening, and doubly so!
