Connect with us

Black Listed

How to Protect Your Apple iCloud Account

Is It Safe for You to Use the Cloud After Celebrity Hack?
<p> <span class="credit">Justin Sullivan—Getty Images</span></p>

Use Two-Step Authentication

Two-step authentication requires you to answer two questions before you can access an account. Typically, one question requires you to recall a password and another requires you to look at a text message or email and enter an authentication code. The process is a huge deterrent for hackers who may use one of many sophisticated methods to guess a password but have no way to access your phone to tap in an authentication code. A number of services offer two-step authentication, including the iCloud, Gmail and many banks. For most services you have to opt in.

Check the Cloud, Not Just Your Device

After hearing that her photos had made their way to the Internet, Scott Pilgrim star Mary E. Winstead said she had deleted the photos in question “long ago.” But deleting photos from your phone doesn’t mean that they’re deleted from the cloud. In fact, the cloud exists to back up everything you do and create on a device. If there’s something you never want anyone to see, delete it everywhere!

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Trending

Oprah Winfrey honored in TIME's 'Firsts' series. Oprah Winfrey honored in TIME's 'Firsts' series.

Oprah Signs Multiyear Deal with Apple for Original Content

Entertainment

Cardi B Smashes Taylor Swift’s Apple Streaming Record

Entertainment

FKA twigs Brigthens Her Day in Spike Jonze-Directed Apple Ad

Entertainment

Denise Smith Young Denise Smith Young

Apple VP Resigns After Sharing Questionable View of Diversity

News

Advertisement
Connect
Newsletter Signup