Apple can pride itself on having a very secure ecosystem compared to its competitors, of course. But The weakest link in an operating system is always the user. We can still make a mistake, an error, even if we are alert, and this can easily trick someone into accessing our data.
This also affects iOS 17: no matter how secure the system is, we can still fall victim to the Phishing by accident. What to do when we suspect that someone has entered our iPhone? GOOD There is something simple that everyone can do without problem.
In case of suspicion, the first measure is a restart
If we suspect that someone may have accessed our iPhone, obviously a series of measures must be taken. Change the password of our Apple ID, our lock code, change the identifiers of sensitive applications like those of our banks, perhaps change the password of our WiFi… but A first measure of impact we can apply is something as simple as restarting the iPhone.
It is approved by the GrapheneOS developer team, a version of Android particularly focused on system security. Its developers offer the possibility of automatically restarting the phone every 18 hours, knowing that this is a measure that cut off any type of connection anyone might have had with the device. Even though this is an Android measure, in iOS we can also nip these risks in the bud by performing this restart.
In any case, I always recommend not to be obsessed with security or with excessive suspicion: in the majority of cases that I have seen in my experience, what were initially suspicions of attacks do not was nothing more than confusion about the behavior of the iPhone. The slightest error message should not be considered a serious intrusion.
New iOS security measures to protect against complex attacks
Beyond this preventive restart, iOS 17 has special measures for cases in which we suspect that we have been victims of attacks. The first is the isolation mode, which applies a series of strict security measures to the iPhone: messages cannot contain attachments, calls are not received unless they come from contacts that we have previously called, albums are not shared, and wired connections are not supported until the iPhone is unlocked.
iOS 17.3 also has a measure called Stolen Device Protection. With this we can add an extra layer of security to protect certain system functions. For example, we will be asked for authentication via Face ID to change the Apple ID password. Particularly useful if we want to be proactive about the possibility of our iPhone being stolen.
Pictures | Generated with Bing
In Applesfera | Chinese hackers have been stealing Apple Pay data from Europe’s largest chipmaker for years.
In Applesfera | How to Stop Airplane Mode from Activating If Your iPhone Has Been Stolen