Find my iPhone RSS Feed
How to find the owner of a lost or stolen iPhone

How to find the owner of a lost or stolen iPhone

Every once in a while I have a reader ask me what they should do with a lost or stolen iPhone they've somehow come across. In most cases their biggest concern is finding the original owner, as it should be. Unfortunately that task sometimes proves to be a little tougher than some people imagine,...
Family Sharing on iOS 8: Explained

Family Sharing on iOS 8: Explained

iPhones, iPod touches, iPads everywhere — everyone in the family has devices and uses them for everything. One of iOS 8's key improvements is more convenient family sharing. This is what it is and how it works. Easier media sharing and better parental control You've been able to share media...
Find My iPhone

Apple confirms iCloud breach not the reason behind Apple ID hijack

Yesterday, we reported that several iPhone and iPad users in Australia were locked out of their devices. Apple issued a statement today clarifying that the iCloud service, which forms the backend for the Find my iPhone service, was unaffected, and that users impacted by the hack should change...
Bizarre Australian iPhone, iPad hijack serves as yet another reminder to use unique passwords

Bizarre Australian iPhone, iPad hijack serves as yet another reminder to use unique passwords

There are reports coming out of Australia about iPhones and iPads somehow getting locked down by Find my iPhone, in some cases with a message claiming the devices will only be unlocked if a AUS$100 ransom is paid. What makes this bizarre is that it appears to only be happening in Australia (and...
Don't risk your safety, leave finding stolen iPhones and iPads to the police

Don't risk your safety, leave finding stolen iPhones and iPads to the police

Find my iPhone, a technology that allows you to track down your iPhone, iPod touch, iPad, or Mac to the last place it was connected to a cellular or Wi-Fi network, has unsurprisingly lead to incidents of "hero complex" over the years. That's when an every day person, not affiliated with law-...
Find my Mac passcode lock brute-force attack: What you need to know!

Find my Mac passcode lock brute-force attack: What you need to know!

When Apple launched Find my Mac as an extension to their Find my iPhone system back in October of 2011 they included the ability to lock a Mac down so that it couldn't be accessed or rebooted into alternate modes. The lock, however, was implemented using a simple 4-digit passcode (PIN). That...
How to secure your iPhone and iPad with Activation Lock

How to secure your iPhone and iPad with Activation Lock

iPhones and iPads are stolen on a daily basis and while you can't always keep it from happening, you can make sure that a thief can't simply disable Find My iPhone leaving you without a way to track it by using Activation Lock. Not only that, it can also keep them from being able to restore your...
Apple updates Find my iPhone for iOS 7

Apple updates Find my iPhone for iOS 7

Find my iPhone, which also serves as Find my iPod touch and Find my iPad, has been update with an all new, all clean design optimized for iOS 7. No other new features to bullet point, but it looks great, works better than ever - the new designed seems to improve the user experience considerably...
Find My iPhone receives bug fix and stability enhancement update

Find My iPhone gets updated, glitching out for some iOS 6 users

Find My iPhone has just been updated to version 2.0.3 and all Apple's saying is that it contains bug fixes and stability improvements.I haven't seen anything particularly of interest but I know I was experiencing crashes periodically while using it so we'll see if those issues are corrected over...
How we handle security at iMore: Our apps and approaches to keeping our data safe!

How we handle security at iMore: Our apps and approaches to keeping our data safe!

All this week on Talk Mobile we've been discussing security - how we keep our information, and the information of others safe. Each of us here at iMore have different approaches, different go-to apps and authentication methods, and generally different levels of paranoia we try to balance with the...

Pages