Categories: Apple

Flaw allows thieves to open locked iPads

Have you ever worried about your tablet’s security? If not, you should. Networked gadgets are becoming increasingly interconnected every day, and just one social media account saved on a compromised iPad could lead to breaches on any number of other, more sensitive devices. If you own one of Apple’s popular tablets, you need to know about a newly discovered flaw that allows thieves to bypass security measures and access your device.

iPad owners who find themselves in the unfortunate situation of having their device stolen have the option to activate Apple’s Find My iPhone feature from icloud.com. If an iPad has this setting turned on, its GPS can be activated from any web browser to inform the owner where it is located.

Furthermore, if a user is concerned that the tablet may have been stolen, he or she can remotely lock the device. From the moment it is locked, the device can only be accessed by logging into the corresponding icloud.com account.

It’s a wonderfully intuitive feature, and tens of thousands of iPad owners have prevented data theft since it was first introduced by Apple in 2010. Unfortunately, security researchers recently announced a critical flaw that allows common thieves to totally bypass the remote lock feature simply by flooding login data fields with too many characters.

Apple is aware of the issue and has taken steps to address it with an operating system update. The latest version of iOS has fixed the issue for iPhones, but not for iPads.

Although we anticipate a patch to fix this flaw in the near future, the best way to avoid this predicament is to keep valuable data backed up separately from your iPad. One of the Find My iPhone options is to remotely wipe the device, which means as long as you aren’t permanently losing valuable data, the worst case scenario is losing nothing more than the tablet itself.

The more mobile our technology becomes, the more susceptible it is to physical security threats. It’s important to secure your devices not only from networked threats, but also from everyday ones, like someone nabbing your iPad while you step away from the table to order a coffee. For across-the-board security solutions and consulting, get in touch with us today.

Ron Pierce

Recent Posts

How Cloud Backup Keeps Teams Connected During Winter Downtime

When winter weather starts acting up in Greensboro, North Carolina, keeping a small business running…

3 hours ago

Unlocking Growth: How Cloud-Hosted Solutions Can Securely Scale Your Small Business

Cloud-hosted solutions enable small businesses to scale securely and cost-effectively with flexible access, enhanced data…

6 hours ago

Unlocking the Power of AI: Practical Applications for Small and Mid-Sized Businesses

AI empowers small and mid-sized businesses by enhancing customer engagement, automating tasks, and improving efficiency.…

1 day ago

Is Your IT Support Really Tailored to Your Business Size? Discover the Power of Personalized IT Solutions!

Trinity Solutions offers personalized IT support tailored to your business size, boosting productivity, security, and…

2 days ago

Why Trust Matters More Than Contracts in Managed IT Services

Trinity Solutions Inc. prioritizes trust over contracts in managed IT services, offering flexible, personalized support…

3 days ago

Balancing Security and Productivity: The Sweet Spot for Small Businesses

Small businesses must balance robust cybersecurity with team productivity by using smart IT support, productivity…

4 days ago

This website uses cookies.