Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
Well from my understanding, the definition of 'hack' is when an unauthorized person/ stranger gets into your computer or phone, by any method. (Besides someone physically grabbing your phone and using your passcode.) It implies that it's done remotely, and without your permission. It also implies what they actually do when they get in there- which is change or steal stuff. Are you all saying this is not correct? So you're saying that a brute force attack (for example) is not a hack?
At any rate.. the point is they are not sure how it happened.
I understand hacking to be when they figure out how to break through the protections Apple, or whichever has. When they fool a person into giving their password, or get them to click a link, I don't consider that hacking.
It's complicated if your phone is lost, broken, or stolen. I always wonder how 2 factor works if one of those things happen?
Lost? Get a new phone. Broke? Get a new phone. Stolen? Report stolen, try and wipe it through iCloud or ADM and get a new phone.
2 Factor isn't a factor for any of that.
Lost? Get a new phone. Broke? Get a new phone. Stolen? Report stolen, try and wipe it through iCloud or ADM and get a new phone.
2 Factor isn't a factor for any of that.
Yep. Two factor is only going to cause problems if you lose, break, get your phone stolen and can't / won't replace it or get a new sim card to pop in another phone.
Well from my understanding, the definition of 'hack' is when an unauthorized person/ stranger gets into your computer or phone, by any method. (Besides someone physically grabbing your phone and using your passcode.) It implies that it's done remotely, and without your permission. It also implies what they actually do when they get in there- which is change or steal stuff. Are you all saying this is not correct? So you're saying that a brute force attack (for example) is not a hack?
At any rate.. the point is they are not sure how it happened.
If somebody uses your login credentials without your permission they would not be hacking into a system even though they would be gaining unauthorized access. There is no evidence to suggest that this was a brute force attack though. Several months ago some celebrity had her nude photos taken from iCloud and at the time people thought iCloud was hacked, but the root cause turned out to be a phishing scene that gave the thief the login credentials.
Lost? Get a new phone. Broke? Get a new phone. Stolen? Report stolen, try and wipe it through iCloud or ADM and get a new phone.
2 Factor isn't a factor for any of that.
What if you need something during the time you have no phone?
I don't understand the question. Do you mean because I won't be able to two factor auth into anything since it uses my text messaging? I have a few setup with SMS and Email so I always have one to fall back on.
I don't understand the question. Do you mean because I won't be able to two factor auth into anything since it uses my text messaging? I have a few setup with SMS and Email so I always have one to fall back on.
I don't have a fallback. SMS goes to my phone. I guess I need to learn a way to set up a fall back option.
If you have iCloud lock issues on your iPhone or iPads just contact icloudremovers@usa.com on email and they will unlock it
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.
Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.