{"id":70,"date":"2017-09-25T11:05:50","date_gmt":"2017-09-25T11:05:50","guid":{"rendered":"http:\/\/thecomputersaint.com\/blog\/?p=70"},"modified":"2017-09-25T11:05:50","modified_gmt":"2017-09-25T11:05:50","slug":"ipad-iphone-mac-book-and-apple-watch-devices-are-locked-for-ransom","status":"publish","type":"post","link":"http:\/\/thecomputersaint.com\/blog\/ipad-iphone-mac-book-and-apple-watch-devices-are-locked-for-ransom\/","title":{"rendered":"iPad, iPhone, Mac Book and Apple Watch devices are locked for ransom!"},"content":{"rendered":"<p>It has come to light from middle of September that there has been attacks on apple devices.<\/p>\n<p>The attack manifests itself as a malicious person getting through the security of users\u2019 icloud account using the \u201cFind My Device\u201d feature.<\/p>\n<p>The malicious person will set a specific device to \u201clock\u201d, this will enable the iPad, Apple Watch, Mac Book or iPhone to be locked, in theory so a thief can\u2019t access the data and make the device unusable and once you have the device back in the correct persons hand you\u2019ll then input the code to make it all work again.<br \/>\nExcept in this circumstance people are seeing a message along the lines for \u201cpay me X.XBTC to address XYZ and I\u2019ll send you a code to unlock\u201d.<\/p>\n<p>The hacked accounts are often users who use the same passwords for different sites, where those sites might have been compromised. It is advisable to change your icloud login details to something else if you are a person who uses the same logins for different sites.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p dir=\"ltr\" lang=\"en\">Y&#8217;all my MacBook been locked and hacked. Someone help me <a href=\"https:\/\/twitter.com\/Apple\">@apple<\/a> <a href=\"https:\/\/twitter.com\/AppleSupport\">@AppleSupport<\/a> <a href=\"https:\/\/t.co\/BE110TMgSv\">pic.twitter.com\/BE110TMgSv<\/a><\/p>\n<p>\u2014 Jovan (@bunandsomesauce) <a href=\"https:\/\/twitter.com\/bunandsomesauce\/status\/909181846591860736\">September 16, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>&nbsp;<\/p>\n<p>Some people and sites are advising to disable the \u201cfind my\u201d device service, but that rather defeats the object of the service. However as some have also pointed out Mat Honan (Journalist) was hacked after a successful attack after someone called the Apple support to change his password with his billing address and his last 4 digits of his credit card. You can read about that below.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"SRU5j0ldCI\"><p><a href=\"https:\/\/www.wired.com\/2012\/08\/apple-amazon-mat-honan-hacking\/\">How Apple and Amazon Security Flaws Led to My Epic Hacking<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.wired.com\/2012\/08\/apple-amazon-mat-honan-hacking\/embed\/#?secret=SRU5j0ldCI\" data-secret=\"SRU5j0ldCI\" width=\"593\" height=\"334\" title=\"&#8220;How Apple and Amazon Security Flaws Led to My Epic Hacking&#8221; &#8212; WIRED\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It has come to light from middle of September that there has been attacks on apple devices. The attack manifests itself as a malicious person getting through the security of users\u2019 icloud account using the \u201cFind My Device\u201d feature. The&hellip;<\/p>\n<p class=\"more-link-p\"><a class=\"more-link\" href=\"http:\/\/thecomputersaint.com\/blog\/ipad-iphone-mac-book-and-apple-watch-devices-are-locked-for-ransom\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[32],"tags":[96,98,100,97,99,101,38],"_links":{"self":[{"href":"http:\/\/thecomputersaint.com\/blog\/wp-json\/wp\/v2\/posts\/70"}],"collection":[{"href":"http:\/\/thecomputersaint.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/thecomputersaint.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/thecomputersaint.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/thecomputersaint.com\/blog\/wp-json\/wp\/v2\/comments?post=70"}],"version-history":[{"count":2,"href":"http:\/\/thecomputersaint.com\/blog\/wp-json\/wp\/v2\/posts\/70\/revisions"}],"predecessor-version":[{"id":72,"href":"http:\/\/thecomputersaint.com\/blog\/wp-json\/wp\/v2\/posts\/70\/revisions\/72"}],"wp:attachment":[{"href":"http:\/\/thecomputersaint.com\/blog\/wp-json\/wp\/v2\/media?parent=70"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/thecomputersaint.com\/blog\/wp-json\/wp\/v2\/categories?post=70"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/thecomputersaint.com\/blog\/wp-json\/wp\/v2\/tags?post=70"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}