{"id":26302,"date":"2014-05-21T15:56:58","date_gmt":"2014-05-21T22:56:58","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=26302"},"modified":"2024-07-01T17:16:01","modified_gmt":"2024-07-02T00:16:01","slug":"have-hackers-defeated-the-iphone-kill-switch","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/","title":{"rendered":"Have Hackers Defeated the iPhone Kill Switch?"},"content":{"rendered":"<p>Last month, I explained how iPhone and iPad users could <a title=\"How to enable the \u201cKill Switch\u201d on your iPhone or iPad, right now!\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-the-kill-switch-on-your-iphone-or-ipad\/\" target=\"_blank\" rel=\"noopener\">enable a &#8220;Kill Switch,&#8221;<\/a>\u00a0effectively making it much harder for thieves to sell stolen devices.<\/p>\n<p>And, what&#8217;s the reason why your iPhone or iPad just became a whole lot less attractive to pickpockets?<\/p>\n<p>Well, when you realize your phone is lost or stolen, you can now remotely tell it to display a phone number and message on its screen. And, rather wonderfully, the message continues to be displayed even if the device is wiped.<\/p>\n<div id=\"attachment_24733\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-24733\" loading=\"lazy\" class=\"size-full wp-image-24733\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-custom-message.jpeg\" alt=\"You can display a message and contact details on the lost device.\" width=\"600\" height=\"252\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-custom-message.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-custom-message-150x63.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-custom-message-300x126.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><p id=\"caption-attachment-24733\" class=\"wp-caption-text\">You can display a message and contact details on the lost device.<\/p><\/div>\n<p>The idea is that the message will stop a criminal from being able to sell your phone to someone else, and the device&#8217;s screen will remain locked until your Apple ID and password are entered.<\/p>\n<div id=\"attachment_24658\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-24658\" loading=\"lazy\" class=\"aligncenter size-full wp-image-24658\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-activate-iphone-600x300.jpeg\" alt=\"Activation lock on iPhone\" width=\"600\" height=\"300\" border=\"1\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-activate-iphone-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-activate-iphone-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-activate-iphone-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><p id=\"caption-attachment-24658\" class=\"wp-caption-text\">This iPhone cannot be used until the correct Apple ID and passcode is entered.<\/p><\/div>\n<p>If you like the idea of this, follow the <a title=\"How to enable the \u201cKill Switch\u201d on your iPhone or iPad, right now!\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-the-kill-switch-on-your-iphone-or-ipad\/\" target=\"_blank\" rel=\"noopener\">advice in my earlier article<\/a> on how to enable the Activation Lock feature.<\/p>\n<p>But there&#8217;s some bad news, too.<\/p>\n<p>A couple of hackers are <a title=\"Link to MacRumors article\" href=\"https:\/\/www.macrumors.com\/2014\/05\/21\/hackers-icloud-locking-compromise\/\" target=\"_blank\" rel=\"nofollow noopener\">reported<\/a> to have found a way to bypass the iOS Activation Lock, opening the door for criminals to sell stolen iPhones and iPads to others.<\/p>\n<p>A report in Dutch newspaper <em><a title=\"Link to De Telegraaf report\" href=\"https:\/\/web.archive.org\/web\/20160531082750\/http:\/\/www.telegraaf.nl\/binnenland\/22648117\/__Nederlanders_kraken_iCloud__.html\" target=\"_blank\" rel=\"nofollow noopener\">De Telegraaf<\/a><\/em> goes on to claim that the two-man Dutch \/ Moroccan hacking gang may also have found a way to access sought-after Apple ID passwords and other information which is stored in iCloud.<\/p>\n<p><em>MacRumors<\/em> has provided some further details of what appears to have happened:<\/p>\n<blockquote style=\"margin: 15px; padding: 15px 15px 5px; border-left: 5px solid #ccc; font-size: 13px; font-style: normal; font-family: 'Helvetica Neue', Helvetica, sans-serif; line-height: 19px;\"><p>The hackers reportedly worked on the vulnerability for five months, studying the transmission of data between iPhone handsets and Apple&#8217;s iCloud services. The pair claim to be able to unlock a locked iPhone by placing a computer between the iPhone and Apple&#8217;s servers. In this configuration, the iPhone mistakenly identifies the hacker&#8217;s computer as one of Apple&#8217;s servers and follows instructions provided by the nefarious computer to reverse activation lock on the handset.<\/p><\/blockquote>\n<p>The hackers, who call themselves &#8220;AquaXetine&#8221; and &#8220;MerrukTechnolog,&#8221; claim that they informed Apple of the serious security issue in March &#8211; but have still not received a response from the company.<\/p>\n<p>Of course, regardless of whether the hackers have managed to bypass the iPhone&#8217;s Activation Lock or not doesn&#8217;t mean that you shouldn&#8217;t still use it &#8211; and the other features of &#8220;Find my iPhone&#8221; &#8211; to better protect your device from theft and accidental loss.<\/p>\n<p>Just because some hackers might have found a way around that element of the protection doesn&#8217;t mean that the vast majority of phone thieves would have a clue how to go about it.<\/p>\n<p>And let us all hope that if there is a vulnerability, Apple resolves it quickly with a software patch.<\/p>\n<p><a name=\"learnmore\"><\/a><\/p>\n<h3 id=\"exploremore\">How can I learn more?<\/h3>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security, and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last month, I explained how iPhone and iPad users could enable a &#8220;Kill Switch,&#8221;\u00a0effectively making it much harder for thieves to sell stolen devices. And, what&#8217;s the reason why your iPhone or iPad just became a whole lot less attractive to pickpockets? Well, when you realize your phone is lost or stolen, you can now [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":26353,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[541,477,8,9,961],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Last month, I explained how iPhone and iPad users could enable a &quot;Kill Switch,&quot;\u00a0effectively making it much harder for thieves to sell stolen devices. And,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Have Hackers Defeated the iPhone Kill Switch? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Last month, I explained how iPhone and iPad users could enable a &quot;Kill Switch,&quot;\u00a0effectively making it much harder for thieves to sell stolen devices. And,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-21T22:56:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-02T00:16:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-pickpocket-featured.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"440\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-pickpocket-featured.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-pickpocket-featured.jpeg\",\"width\":440,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/\",\"name\":\"Have Hackers Defeated the iPhone Kill Switch? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#primaryimage\"},\"datePublished\":\"2014-05-21T22:56:58+00:00\",\"dateModified\":\"2024-07-02T00:16:01+00:00\",\"description\":\"Last month, I explained how iPhone and iPad users could enable a \\\"Kill Switch,\\\"\\u00a0effectively making it much harder for thieves to sell stolen devices. And,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Have Hackers Defeated the iPhone Kill Switch?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Have Hackers Defeated the iPhone Kill Switch?\",\"datePublished\":\"2014-05-21T22:56:58+00:00\",\"dateModified\":\"2024-07-02T00:16:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#webpage\"},\"wordCount\":566,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-pickpocket-featured.jpeg\",\"keywords\":[\"Activation Lock\",\"Hackers\",\"iPad\",\"iPhone\",\"Kill Switch\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Last month, I explained how iPhone and iPad users could enable a \"Kill Switch,\"\u00a0effectively making it much harder for thieves to sell stolen devices. And,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/","og_locale":"en_US","og_type":"article","og_title":"Have Hackers Defeated the iPhone Kill Switch? - The Mac Security Blog","og_description":"Last month, I explained how iPhone and iPad users could enable a \"Kill Switch,\"\u00a0effectively making it much harder for thieves to sell stolen devices. And,","og_url":"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-05-21T22:56:58+00:00","article_modified_time":"2024-07-02T00:16:01+00:00","og_image":[{"width":440,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-pickpocket-featured.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-pickpocket-featured.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-pickpocket-featured.jpeg","width":440,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/","name":"Have Hackers Defeated the iPhone Kill Switch? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#primaryimage"},"datePublished":"2014-05-21T22:56:58+00:00","dateModified":"2024-07-02T00:16:01+00:00","description":"Last month, I explained how iPhone and iPad users could enable a \"Kill Switch,\"\u00a0effectively making it much harder for thieves to sell stolen devices. And,","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Have Hackers Defeated the iPhone Kill Switch?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Have Hackers Defeated the iPhone Kill Switch?","datePublished":"2014-05-21T22:56:58+00:00","dateModified":"2024-07-02T00:16:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#webpage"},"wordCount":566,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-pickpocket-featured.jpeg","keywords":["Activation Lock","Hackers","iPad","iPhone","Kill Switch"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-pickpocket-featured.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-6Qe","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/26302"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=26302"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/26302\/revisions"}],"predecessor-version":[{"id":100985,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/26302\/revisions\/100985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/26353"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=26302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=26302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=26302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}