Connect with us

Black Listed

How to Protect Your Apple iCloud Account

Is It Safe for You to Use the Cloud After Celebrity Hack?
<p> <span class="credit">Justin Sullivan—Getty Images</span></p>

Use Two-Step Authentication

Two-step authentication requires you to answer two questions before you can access an account. Typically, one question requires you to recall a password and another requires you to look at a text message or email and enter an authentication code. The process is a huge deterrent for hackers who may use one of many sophisticated methods to guess a password but have no way to access your phone to tap in an authentication code. A number of services offer two-step authentication, including the iCloud, Gmail and many banks. For most services you have to opt in.

Check the Cloud, Not Just Your Device

After hearing that her photos had made their way to the Internet, Scott Pilgrim star Mary E. Winstead said she had deleted the photos in question “long ago.” But deleting photos from your phone doesn’t mean that they’re deleted from the cloud. In fact, the cloud exists to back up everything you do and create on a device. If there’s something you never want anyone to see, delete it everywhere!

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *


Oprah Bringing Book Club & Documentaries to Apple TV+


Oprah Winfrey honored in TIME's 'Firsts' series. Oprah Winfrey honored in TIME's 'Firsts' series.

Oprah Signs Multiyear Deal with Apple for Original Content


Cardi B Smashes Taylor Swift’s Apple Streaming Record


FKA twigs Brigthens Her Day in Spike Jonze-Directed Apple Ad