The exploit involves pasting a specific modified URL when the hacker is answer the death of birth security question in Apple’s iForgot page for users who forgot their passwords, according to a report from online technology publication TheVerge.com.
Apple ID is used for carrying out tasks such as purchasing from the iTunes and App Stores, keeping personal information up-to-date across devices with iCloud, and locating, locking, or wiping devices.
The two-step verification is a feature you can use to keep your Apple ID as secure as possible.
The verification process release by Apple, is also not available for users outside the United States, United Kingdom, Australia, Ireland and New Zealand. Other countries will be added to the list eventually, Apple said.
Understanding how IBM Spectrum Protect enables hybrid data protection
Abdicating your company’s data protection responsibilities to the first cloud solution provider you encounter is just as unwise as doing nothing at all to leverage the cloud. On the other hand, it can be a wise decision to investigate what results you might achieve by choosing a backup technology that is capable of supporting a hybrid protection approach capable of covering both on-premises technology and offsite cloud capabilities.