Contact us today!
(800) 588-4430

IT Blog for Business Owners

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Password Security: How do you Steal iOS Passwords, Just Ask for Them

If you have spent any time using iOS you been prompted to input your iTunes password. This measure can ensure that no one but you can access to your important account data. However, iOS will ask for your password quite often, and security researchers point out this good-intentioned practice could actually have the opposite effect.

Apple’s constant insistence that users enter their passwords leaves them open to phishing. It’s not only the frequency of requests, but the way iOS asks for that password makes it very easy for malicious developers to steal passwords. You might think you’re just typing your password into yet another Apple dialog box, but it could be a fake.

Until Apple makes some changes, users can protect themselves by pressing the home button before inputting their password in dialog boxes. If the box is spawned by the app, it will disappear along with the rest of the app. If it’s actually a system dialog, it will remain on the screen.  


Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Malware Privacy Business Computing Productivity Business Email Microsoft Internet Hosted Solutions Windows 10 Software Backup Managed Service Provider Ransomware Computer IT Services Network Security Mobile Devices Android Smartphone User Tips Managed IT services Social Media Google IT Support Workplace Tips Hardware Browser Outsourced IT Communication Business Continuity Efficiency Disaster Recovery Smartphones Innovation App Data Management Data Backup Upgrade Data Small Business Cloud Computing Business Management Office Holiday Microsoft Office Data Recovery Server Office 365 Remote Monitoring Windows Internet of Things Miscellaneous Facebook WiFi Network Artificial Intelligence Gmail Big Data Spam Encryption Recovery Robot Save Money Paperless Office Password Productivity Bandwidth Firewall Apps Phishing Hosted Solution Infrastructure Apple Government Avoiding Downtime Office Tips Money Work/Life Balance Mobile Device Management Employer-Employee Relationship Customer Service Tip of the week Risk Management Document Management Saving Money Cybersecurity Remote Computing Word Managed IT Services Hacker Tech Term Customer Relationship Management Unified Threat Management Content Filtering Chrome Passwords How To Health Virtual Reality Website Wi-Fi SaaS BDR Hacking BYOD Mobile Computing Windows 10 Tech Support Two-factor Authentication Settings Telephone Systems Analytics Operating System The Internet of Things File Sharing Data Security Computers IT Support VoIP Business Growth Vendor Management Presentation Alert Education Compliance IT Management Outlook Data storage Cybercrime Computing Antivirus Mobile Device Managed IT Social Data loss Applications Business Owner Smart Technology Tablet Training Downtime HIPAA communications Marketing Mobile Security YouTube Upgrades Unified Communications Automobile Budget Competition Patch Management End of Support Scam LiFi Mouse Information Technology Vulnerability Collaboration Humor Legal VPN Augmented Reality Identity Theft Analyitcs Twitter Monitors Running Cable Politics IBM Virtual Private Network Travel Assessment Server Management Google Drive Automation Websites Search Physical Security Going Green Bring Your Own Device Licensing Specifications Taxes Sports IT service Maintenance Botnet Cortana Printing Digital Payment Samsung Virtualization User Administration Regulations Storage Project Management IT solutions Retail Safety Computer Care Best Practice Wireless Technology Business Technology Lithium-ion battery Wireless Point of Sale Experience Technology Laws Motherboard Network Management Drones Bitcoin Internet Exlporer Mobile Lenovo VoIP Software as a Service Staffing Error Unified Threat Management Router Touchscreen Distributed Denial of Service Windows 8 Disaster PowerPoint Domains Vulnerabilities Shortcut Superfish Entrepreneur IT Technicians Digital Technology Tips GPS 5G Consumers Web Server business communications systems Update Application Modem Managed IT Service Google Maps Hotspot Uninterrupted Power Supply Users Public Speaking Geography 3D Printing Mirgation Spyware Comparison Tracking Administrator Cameras Internet Protocol Chromebook Cookies Break Fix Language Solid State Drive eWaste Printer Law Enforcement Cables Network Congestion IT Sevices Networking Unsupported Software Migration How To Black Friday CCTV Laptop VoIP streamlines Emoji Hard Drives Nanotechnology Heating/Cooling Dark Web Display Computing Infrastructure Hard Disk Drive Environment Access Control Virtual Desktop Gadget Wires Mobile Data Chatbots Firefox Hacks Cyber Monday Halloween business network infrastructure Refrigeration IoT Servers Data Warehousing Alerts Troubleshooting SharePoint Fun Techology Identity Current Events flu season Supercomputer Deep Learning G Suite Scary Stories data services Processors Utility Computing Microsoft Excel Help Desk Mail Merge Cooperation Downloads Phone System Motion Sickness Disaster Resistance Consultation Fort Worth IT Budget User Error Undo Healthcare Statistics Google Docs Blockchain Address Writing Staff Multi-Factor Security IP Address Proactive IT Personal Information flu shot Alt Codes Software Tips IT Consultant Cost Management Bluetooth Permissions Redundancy Social Engineering Flexibility Corporate Profile Google Calendar Machine Learning Mobile Office Meetings IT Consulting Computer Repair Quick Tips Fort Worth IT Typing Fraud Cleaning Buisness Notifications Management Operations WannaCry iPhone Legislation Relocation Webcam Knowledge Data Breach Electronic Medical Records Social Networking Time Management Google Wallet DFW IT Service Cryptocurrency Net Neutrality Cabling Crowdsourcing Enterprise Resource Planning Dark Data Wearable Technology Private Cloud

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...