Activation Lock

How to turn off Find My iPhone and Activation Lock
Mastering iCloud

How to turn off Find My iPhone and Activation Lock

Kathy McGraw and Rene Ritchie 11

With Find my iPhone you can keep track of all your Apple devices and even remotely wipe them if they ever get lost or stolen. If you ever need to restore your iPhone, iPad, or iPod touch in iTunes, however, or if you ever want to sell or give it away, you'll need to disable Find my iPhone (or iPad) first. That's because Find my iPhone (or iPad) also governs Activation Lock, Apple's...

iPhone theft drops significantly thanks to Activation Lock
Activation Lock FTW

iPhone theft drops significantly thanks to Activation Lock

Harish Jonnalagadda 11

The introduction of Activation Lock was credited by the FCC in December as the main factor behind the reduction in iPhone-related theft, and new data suggests that the trend has continued since. The latest numbers reveal a decline of 40 percent in the number of iPhones stolen in San Francisco and 25 percent in New York between September 2013 and September 2014. The number of iPhones...

How to disable Find My iPhone and Activation Lock remotely
Find My iPhone Tips

How to disable Find My iPhone and Activation Lock remotely

Allyson Kazmucha 53

If you're running iOS 7 or higher on your iPhone or iPad, Find My iPhone now comes with a feature called Activation Lock that prevents someone from wiping and using your device without your authorization. While it's a great theft deterrent, it can create a problem if you sell or get rid of a device before disabling Find My iPhone First. Most commonly the problem comes up with second...

iOS 7 Activation Lock bypass discovered, protect yourself with Touch ID or Passcode

iOS 7 Activation Lock bypass discovered, protect yourself with Touch ID or Passcode

Rene Ritchie 37

A bug has been found in iOS 7 that allows a an attacker with physical control over a lost or stolen iPhone to get around Activation Lock and gain access to the device. Unfortunately, the method for circumventing Activation Lock has been made public. However, the bypass process requires the attacker have access to an unlocked device, and be able to access the device after a reboot, so it...