Contact us today!
(800) 588-4430

IT Blog for Business Owners

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Password Security: How do you Steal iOS Passwords, Just Ask for Them

If you have spent any time using iOS you been prompted to input your iTunes password. This measure can ensure that no one but you can access to your important account data. However, iOS will ask for your password quite often, and security researchers point out this good-intentioned practice could actually have the opposite effect.

Apple’s constant insistence that users enter their passwords leaves them open to phishing. It’s not only the frequency of requests, but the way iOS asks for that password makes it very easy for malicious developers to steal passwords. You might think you’re just typing your password into yet another Apple dialog box, but it could be a fake.

Until Apple makes some changes, users can protect themselves by pressing the home button before inputting their password in dialog boxes. If the box is spawned by the app, it will disappear along with the rest of the app. If it’s actually a system dialog, it will remain on the screen.  

AppleSecurity.jpg

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Malware Privacy Business Computing Productivity Email Business Microsoft Internet Hosted Solutions Windows 10 Software Backup Managed Service Provider Ransomware Network Security Computer IT Services Mobile Devices Android Smartphone User Tips Managed IT services Hardware Outsourced IT Google Browser IT Support Workplace Tips Social Media Innovation Efficiency Communication Disaster Recovery Business Continuity Data Data Backup App Business Management Data Management Smartphones Cloud Computing Small Business Productivity Office Holiday Upgrade Server Office 365 Remote Monitoring Windows Miscellaneous WiFi Internet of Things Facebook Microsoft Office Data Recovery Network Artificial Intelligence Gmail Big Data Spam Phishing Encryption Tech Term Password Unified Threat Management Customer Relationship Management Bandwidth Firewall Robot Apps Save Money Paperless Office Hosted Solution Recovery Customer Service Mobile Device Management Document Management Tip of the week Employer-Employee Relationship Cybersecurity Risk Management Saving Money Remote Computing Managed IT Services Word Hacker Passwords Chrome How To Content Filtering Government Apple Money Avoiding Downtime Infrastructure Work/Life Balance Wi-Fi Office Tips Compliance File Sharing Two-factor Authentication Operating System Settings Analytics Vendor Management Data Security VoIP Applications Presentation The Internet of Things Business Growth IT Support Computers Alert Data storage Outlook IT Management Computing Education Mobile Device Antivirus Project Management Cybercrime Virtual Reality Managed IT Health Data loss BDR SaaS BYOD Social Hacking Website Mobile Computing Tech Support Windows 10 Telephone Systems YouTube Patch Management Collaboration Unified Communications Scam Legal Information Technology Regulations Vulnerability Identity Theft LiFi Humor Twitter Politics Monitors VPN Travel Analyitcs Google Drive Websites Automation Virtual Private Network Smart Technology Assessment Physical Security Augmented Reality Going Green HIPAA Server Management Licensing Taxes Botnet Router IBM Running Cable Digital Payment Specifications Mobile Security Printing Samsung Maintenance Meetings Bring Your Own Device Search User Sports Storage IT service Cortana Retail Virtualization Computer Care Administration Best Practice Tablet Lithium-ion battery Training IT solutions Business Owner Business Technology Safety Wireless Technology Automobile Upgrades Marketing Wireless Budget Downtime End of Support Healthcare communications Mouse Competition Law Enforcement Network Congestion flu shot Domains Uninterrupted Power Supply Entrepreneur Cost Management Unsupported Software Permissions 5G Spyware Internet Protocol Flexibility Google Calendar Application CCTV WPA3 Emoji eWaste Gadget Users Display Fort Worth IT Public Speaking IT Sevices Solid State Drive How To Management Mobile Data Networking Fraud Hacks VoIP streamlines Operations Heating/Cooling Legislation Fleet Tracking Environment Social Networking DFW IT Service Hard Disk Drive Firefox Supercomputer Enterprise Resource Planning Net Neutrality Current Events Troubleshooting business network infrastructure Wearable Technology Laptop Servers Hard Drives Help Desk G Suite Asset Tracking Processors Motherboard Virtual Desktop IT Budget Motion Sickness Mobile Techology Internet Exlporer data services Halloween Google Docs Phone System Software as a Service Refrigeration Remote Workers Writing Mail Merge Distributed Denial of Service Consultation Vulnerabilities Deep Learning Personal Information Disaster Resistance Fun IT Technicians Scary Stories Statistics Technology Tips Software Tips IT Consultant Electronic Health Records Machine Learning Modem Social Engineering Address Managed IT Service User Error Geography Computer Repair Proactive IT Hotspot Mirgation Bluetooth Comparison Undo Cleaning Cyberattacks Notifications Relocation Cookies Redundancy Break Fix IP Address Corporate Profile Quick Tips Printer Webcam Cables Alt Codes Electronic Medical Records IT Consulting Language Google Wallet iPhone Migration Dark Data Black Friday History Bookmarks Crowdsourcing Private Cloud Nanotechnology Dark Web Mobile Office WannaCry Time Management Access Control Point of Sale Wires Typing Data Breach Computing Infrastructure Drones Chatbots Buisness Cyber Monday Cabling Favorites Staffing Error IoT Data Warehousing Network Management SharePoint MSP Cryptocurrency Technology Laws Alerts Knowledge Identity flu season Conferencing GPS Utility Computing Lenovo Microsoft Excel VoIP Experience PowerPoint Touchscreen Downloads Google Maps Web Server Proactive Bitcoin Update Unified Threat Management Cooperation Shortcut Fort Worth Disaster Tracking Administrator 3D Printing Consumers Superfish Blockchain Digital Staff Multi-Factor Security Cameras Remote Monitoring and Management Windows 8 Chromebook business communications systems

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code