{"id":18179,"date":"2018-05-25T08:00:08","date_gmt":"2018-05-25T12:00:08","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=18179"},"modified":"2022-04-27T15:13:49","modified_gmt":"2022-04-27T19:13:49","slug":"the-ios-privacy-icon-will-not-stop-phishing-attacks","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/the-ios-privacy-icon-will-not-stop-phishing-attacks\/","title":{"rendered":"The iOS Privacy Icon Will Not Stop Phishing Attacks"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">If you\u2019re an Apple lover, the new iOS privacy icon can protect you from certain things, but it still leaves your device vulnerable to phishing attacks, sadly. These type of cyber attacks are aimed at stealing your personal and financial information, and usually, the final goal is identity theft or straight up financial gain.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/snapchat-users-subjected-to-malicious-phishing-attack\/\"><b>Snapchat Users Subjected to Malicious Phishing Attack<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The best way to fully protect your iOS device from being hit with a phishing attack is by using\u00a0<\/span><a href=\"https:\/\/go.onelink.me\/DR4q?pid=MKT_BLOG_US&amp;c=iOS_privacy_icon_will_not_stop_phishing_attacks\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">dfndr vpn<\/span><\/a><span style=\"font-weight: 400;\">, which blocks phishing attempts as you navigate the web, while also &#8216;hiding&#8217; your IP address from hackers, so all your online activities remain private and secure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Learn more about the holes in the iOS privacy icon and what you can do about it. <\/span><\/p>\n<p><b>Data Collection<br \/>\n<\/b><span style=\"font-weight: 400;\">The latest iOS software update introduced a <\/span><a href=\"https:\/\/www.zdnet.com\/article\/iphone-ipad-privacy-icon-does-nothing-to-prevent-password-phishing\/\"><span style=\"font-weight: 400;\">privacy icon<\/span><\/a><span style=\"font-weight: 400;\">, which helps you identify when Apple asks for more personal information. However, the update does not change the amount of data that Apple collects. Instead, the icon shows you what data will be collected when using an Apple app or feature for the first time. This new privacy feature is mostly useful for understanding how your app experience will be personalized through data collection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, phishing attacks may still be successful even after you update security features because your iCloud password could still be a target of hackers. Because your iPhone or iPad often asks you to confirm your username and password without indicating why, this vulnerability gives hackers the opportunity to inject malicious code and attain your information.<\/span><\/p>\n<p><b>Protecting Yourself<br \/>\n<\/b><span style=\"font-weight: 400;\">If a legit looking pop-up appears on your iPhone asking for sign-in information,<\/span><a href=\"https:\/\/www.techspot.com\/news\/71341-how-protect-yourself-phishing-popups-ios.html\"><span style=\"font-weight: 400;\">\u00a0verify<\/span><\/a><span style=\"font-weight: 400;\">\u00a0this prompt\u00a0by clicking on the \u2018home\u2019 button. If doing so removes the pop-up, then it was a phishing scam because a true pop-up does not disappear after hitting the \u2018home\u2019 button.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You should also never enter your credentials through an app. Instead, exit the app and go to your iTunes account through Settings. Logins stay active for several minutes by default, so you should be able to open the app without authenticating yourself once you go through iTunes. That\u2019s your clue if it\u2019s legitimate or not.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even Apple\u2019s technology has its flaws, which can be combated with the right mobile security software.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[358,545,249,67],"class_list":["post-18179","post","type-post","status-publish","format-standard","hentry","category-security","tag-protection","tag-safety","tag-security","tag-smartphone"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=18179"}],"version-history":[{"count":6,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18179\/revisions"}],"predecessor-version":[{"id":18927,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18179\/revisions\/18927"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=18179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=18179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=18179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}