	{"id":41491,"date":"2015-05-18T07:50:01","date_gmt":"2015-05-18T14:50:01","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=41491"},"modified":"2024-06-27T09:45:46","modified_gmt":"2024-06-27T16:45:46","slug":"why-thieves-steal-apple-watch-iphone","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/","title":{"rendered":"Why thieves would rather steal your Apple Watch than your iPhone"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-41494\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/apple-watch-600x300.jpeg\" alt=\"Apple Watch\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/apple-watch-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/apple-watch-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/apple-watch-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>There&#8217;s something important you need to know about the Apple Watch.<\/p>\n<p>Muggers and thieves love it. And they would rather steal your shiny new Apple Watch than your iPhone.<\/p>\n<p>At first you might think that&#8217;s a crazy claim. After all, surely there are more people in the market to buy a dodgy iPhone off the back of a lorry than a device which *requires* an iPhone to function.<\/p>\n<p>But it&#8217;s the truth. And the reason why criminals would love to steal an Apple Watch is because it&#8217;s so much easier for them to sell than a stolen iPhone.<\/p>\n<p>The problem is this.<\/p>\n<p>Over the years, Apple responded to a wave of &#8220;apple-jacking&#8221; street criminals who mugged iPhone-carrying members of the public. Since iOS 7, you have been able to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-the-kill-switch-on-your-iphone-or-ipad\/\" target=\"_blank\" rel=\"noopener\">enable a feature called &#8220;Activation Lock&#8221;<\/a> on your iPhone and iPad; and since iOS, 8 Apple has enabled it by default.<\/p>\n<p>Activation Lock renders your mislaid or stolen smartphone useless \u2014\u00a0stopping criminals from resetting the device back to its just-shipped factory state. Furthermore, you can remotely tell your lost iPhone to display a message on its screen,\u00a0which will continue to be displayed even if the device is wiped.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-24754\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-custom-message-thumb.jpeg\" alt=\"&quot;Kill Switch&quot;\" width=\"400\" height=\"260\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-custom-message-thumb.jpeg 400w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-custom-message-thumb-150x97.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-custom-message-thumb-300x195.jpeg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/p>\n<p>Hackers can only reset the phone properly if they enter the real owner&#8217;s Apple ID username and password.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-24658\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-activate-iphone-600x300.jpeg\" alt=\"Activation lock on iPhone\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-activate-iphone-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-activate-iphone-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/intego-activate-iphone-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>As you can see, it&#8217;s going to be a lot harder for criminals to sell an iPhone like that to someone else.<\/p>\n<p>As a result of &#8220;Activation Lock,&#8221; iPhone thefts in major cities <a href=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-thefts-drop-in-major-cities-as-result-of-ios-7s-activation-lock\/\" target=\"_blank\" rel=\"noopener\">dropped dramatically<\/a>.<\/p>\n<p>So far, so good.<\/p>\n<p>But here&#8217;s the sting in the tail: The new Apple Watch doesn&#8217;t have Activation Lock.<\/p>\n<p>Which means that if the person who mugs you ignores your iPhone, and chooses to snatch the Apple Watch off your wrist instead, they will be able to reset it back to its factory settings and see it fresh as a daisy without the new purchaser necessarily realising it has been stolen.<\/p>\n<p>Unlike an iPhone, a thief knows precisely where you keep your Apple Watch (well, it&#8217;s likely to be of two places) and will know that they are likely to make some decent cash if they sell it on to others.<\/p>\n<p>This YouTube video (with a rather funky beat) posted on the <a href=\"http:\/\/www.idownloadblog.com\/2015\/05\/13\/the-apple-watch-thieves-reset-no-activation-lock-security\/\" target=\"_blank\" rel=\"noopener\">iDownloadBlog<\/a> shows just how easy it is to reset an Apple Watch:<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/cOcd7xx0vMs?version=3&#038;rel=0&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>Of course, the Apple Watch&#8217;s operating system is still on version one, and we had to wait until iOS 7 before Apple introduced the Activation Lock security measure for iPhones and iPads.<\/p>\n<p>Hopefully Apple will find a way to harden the security of its latest gadget sooner rather than later, and help prevent a spate of thefts. It&#8217;s certainly something of a step backwards not to see it implemented in some form on their luxurious new watch.<\/p>\n<p>By the way, there have been claims made in the past that hackers <a href=\"https:\/\/www.intego.com\/mac-security-blog\/have-hackers-defeated-the-iphone-kill-switch\/\" target=\"_blank\" rel=\"noopener\">may have found ways to circumvent iOS&#8217;s Activation Lock<\/a> on iPhones, but I still believe it remains a very powerful feature in the fight against apple-jacking. Just make sure you <a title=\"Link to Apple support kbase article\" href=\"https:\/\/support.apple.com\/en-gb\/HT201351\" target=\"_blank\" rel=\"nofollow noopener\">disable it and disconnect your device from the iCloud<\/a> before trying to sell your iPhone or iPad to\u00a0someone else.<\/p>\n<p><strong>Update: watchOS 2, released in September 2015, introduced Activation Lock for Apple Watch.<\/strong><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The lack of a simple security measure makes the Apple Watch an attractive target for thieves and muggers.<\/p>\n","protected":false},"author":34,"featured_media":41497,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7],"tags":[541,2197,69,9],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The lack of a simple security measure makes the Apple Watch an attractive target for thieves and muggers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why thieves would rather steal your Apple Watch than your iPhone - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The lack of a simple security measure makes the Apple Watch an attractive target for thieves and muggers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-05-18T14:50:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-27T16:45:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/apple-watch-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/apple-watch-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/apple-watch-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/\",\"name\":\"Why thieves would rather steal your Apple Watch than your iPhone - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#primaryimage\"},\"datePublished\":\"2015-05-18T14:50:01+00:00\",\"dateModified\":\"2024-06-27T16:45:46+00:00\",\"description\":\"The lack of a simple security measure makes the Apple Watch an attractive target for thieves and muggers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why thieves would rather steal your Apple Watch than your iPhone\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Why thieves would rather steal your Apple Watch than your iPhone\",\"datePublished\":\"2015-05-18T14:50:01+00:00\",\"dateModified\":\"2024-06-27T16:45:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#webpage\"},\"wordCount\":647,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/apple-watch-400x260.jpeg\",\"keywords\":[\"Activation Lock\",\"Apple Watch\",\"iOS\",\"iPhone\"],\"articleSection\":[\"Apple\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The lack of a simple security measure makes the Apple Watch an attractive target for thieves and muggers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/","og_locale":"en_US","og_type":"article","og_title":"Why thieves would rather steal your Apple Watch than your iPhone - The Mac Security Blog","og_description":"The lack of a simple security measure makes the Apple Watch an attractive target for thieves and muggers.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-05-18T14:50:01+00:00","article_modified_time":"2024-06-27T16:45:46+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/apple-watch-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/apple-watch-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/apple-watch-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/","name":"Why thieves would rather steal your Apple Watch than your iPhone - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#primaryimage"},"datePublished":"2015-05-18T14:50:01+00:00","dateModified":"2024-06-27T16:45:46+00:00","description":"The lack of a simple security measure makes the Apple Watch an attractive target for thieves and muggers.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Why thieves would rather steal your Apple Watch than your iPhone"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Why thieves would rather steal your Apple Watch than your iPhone","datePublished":"2015-05-18T14:50:01+00:00","dateModified":"2024-06-27T16:45:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#webpage"},"wordCount":647,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/apple-watch-400x260.jpeg","keywords":["Activation Lock","Apple Watch","iOS","iPhone"],"articleSection":["Apple"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/why-thieves-steal-apple-watch-iphone\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/apple-watch-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-aNd","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/41491"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=41491"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/41491\/revisions"}],"predecessor-version":[{"id":100981,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/41491\/revisions\/100981"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/41497"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=41491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=41491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=41491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}