"
data-timestamp-html=""
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2023-04-18T09:17:25Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/tech/2023/04/18/apple-store-mumbai-india-ceo-tim-cook-vedika-sud-ovn-biz-ldn-vpx.cnn"
data-branding-key=""
data-video-slug="apple store mumbai india ceo tim cook vedika sud ovn biz ldn vpx"
data-first-publish-slug="apple store mumbai india ceo tim cook vedika sud ovn biz ldn vpx"
data-video-tags="apple inc,asia,business and industry sectors,business figures,business, economy and trade,companies,continents and regions,domestic alerts,domestic-international news,iab-business and finance,iab-industries,iab-retail industry,iab-shopping,india,mumbai,retail and wholesale trade,south asia,tim cook"
data-details="">
Video Ad Feedback
Apple CEO was presented with an original Macintosh. See his reaction
"
data-timestamp-html=""
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2023-04-18T09:17:25Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/tech/2023/04/18/apple-store-mumbai-india-ceo-tim-cook-vedika-sud-ovn-biz-ldn-vpx.cnn"
data-branding-key=""
data-video-slug="apple store mumbai india ceo tim cook vedika sud ovn biz ldn vpx"
data-first-publish-slug="apple store mumbai india ceo tim cook vedika sud ovn biz ldn vpx"
data-video-tags="apple inc,asia,business and industry sectors,business figures,business, economy and trade,companies,continents and regions,domestic alerts,domestic-international news,iab-business and finance,iab-industries,iab-retail industry,iab-shopping,india,mumbai,retail and wholesale trade,south asia,tim cook"
data-details="">
Video Ad Feedback
Apple CEO was presented with an original Macintosh. See his reaction
"
data-timestamp-html=""
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2023-05-30T19:56:54Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/business/2023/05/30/artificial-intelligence-pose-risk-of-extinction-humanity-salin-sot-nc-vpx.cnn"
data-branding-key=""
data-video-slug="DO NOT USE artificial intelligence pose risk of extinction humanity salin sot nc vpx"
data-first-publish-slug="DO NOT USE artificial intelligence pose risk of extinction humanity salin sot nc vpx"
data-video-tags=""
data-details="">
Video Ad Feedback
Experts warn AI could pose 'extinction' risk for humanity
"
data-timestamp-html=""
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2023-02-14T10:58:28Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/business/2023/02/14/flirt-artificial-intelligence-ai-dating-apps-hinge-tinder-orig.cnn-business"
data-branding-key="nightcap"
data-video-slug="flirt artificial intelligence ai dating apps hinge tinder orig"
data-first-publish-slug="flirt artificial intelligence ai dating apps hinge tinder orig"
data-video-tags="artificial intelligence,business and industry sectors,business, economy and trade,cnn,companies,computer science and information technology,domestic alerts,domestic-business,domestic-health and science,iab-artificial intelligence,iab-business and finance,iab-computing,iab-industries,iab-software and applications,iab-technology & computing,iab-technology industry,international alerts,international-business,international-health and science,mobile apps,mobile technology,openai,software and applications,technology,warnermedia"
data-details="">
Video Ad Feedback
CNN tried an AI flirt app. It was shockingly pervy
"
data-timestamp-html=""
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2023-02-11T02:28:49Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/business/2023/02/11/deepfake-newscast-ai-chinese-messaging-wang-pkg-ac360-vpx.cnn"
data-branding-key=""
data-video-slug="deepfake newscast AI chinese messaging wang pkg ac360 vpx"
data-first-publish-slug="deepfake newscast AI chinese messaging wang pkg ac360 vpx"
data-video-tags=""
data-details="">
Video Ad Feedback
These newscasters you may have seen online are not real people
"
data-timestamp-html=""
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2023-01-28T11:20:56Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/business/2023/01/26/nightcap-chatgpt-students-clip-orig-nb.cnn"
data-branding-key="nightcap"
data-video-slug="nightcap chatgpt students clip orig nb"
data-first-publish-slug="nightcap chatgpt students clip orig nb"
data-video-tags="artificial intelligence,business and industry sectors,business, economy and trade,companies,computer science and information technology,domestic alerts,domestic-business,domestic-health and science,education,education systems and institutions,iab-artificial intelligence,iab-business and finance,iab-computing,iab-education,iab-education industry,iab-industries,iab-technology & computing,iab-technology industry,international alerts,international-business,international-health and science,openai,primary and secondary education,teachers and teaching,technology"
data-details="">
Video Ad Feedback
Hear why this teacher says schools should embrace ChatGPT, not ban it
"
data-timestamp-html=""
data-check-event-based-preview=""
data-is-vertical-video-embed="false"
data-network-id=""
data-publish-date="2023-01-24T14:05:56Z"
data-video-section="business"
data-canonical-url="https://www.cnn.com/videos/business/2023/01/24/what-is-chatgpt-cnntm-pkg-yurkevich-contd-vpx.cnn"
data-branding-key=""
data-video-slug="what is chatgpt cnntm pkg yurkevich contd vpx"
data-first-publish-slug="what is chatgpt cnntm pkg yurkevich contd vpx"
data-video-tags="artificial intelligence,business and industry sectors,business, economy and trade,companies,computer science and information technology,domestic alerts,domestic-business,domestic-health and science,iab-artificial intelligence,iab-business and finance,iab-computing,iab-industries,iab-technology & computing,iab-technology industry,international alerts,international-business,international-health and science,openai,technology"
data-details="">
Video Ad Feedback
He loves artificial intelligence. Hear why he is issuing a warning about ChatGPT
A complex but concerning methodof gaining control over a user’s iPhone and permanently locking them out the device appears to be on the rise.
Some iPhone thieves are exploiting a security setting, called the recovery key, that makes it nearly impossible for owners to access their photos, messages, data and more, according to a recent Wall Street Journal report.Somevictims also told the publicationtheir bank accounts were drained after the thieves gained access to their financial apps.
It’s important to note, however, this type of takeover is hard to pull off. It requires a criminal essentially watching an iPhone user enter the device’s passcode – for example, by looking over their shoulder at a bar or sporting event – or manipulating the device’s owner so they’ll share their passcode. And that’s all before they physically steal the device.
From there, a thief could usethe passcode to change the device’s Apple ID, turn off “Find my iPhone” so their location can’t be tracked, and then reset the recovery key, a complex 28-digit code intended to protect its owners from online hackers.
Apple requires this key to help reset or regain access to an Apple ID in an effort to bolster the user’s security, but if a thief changes it, the original owner will not have the new code and will be locked out of the account.
“We sympathize with people who have had this experience and we take all attacks on our users very seriously, no matter how rare,” an Apple spokesperson said in a statement to CNN. “We work tirelessly every day to protect our users’ accounts and data, and are always investigating additional protections against emerging threats like this one.”
On its website, Apple warns “you’re responsible for maintaining access to your trusted devices and your recovery key. If you lose both of these items, you could be locked out of your account permanently.”
Jeff Pollard, VP and principal analyst at Forrester Research, said the company should offer more customer support options and “ways for Apple users to authenticate so they can reset these settings.”
For now, however, there are a handful of steps users can take to potentially protect themselves from having this happen to them.
Protect the passcode
The first step is protecting the passcode.
An Apple spokesperson told CNN people can use Face ID or Touch ID when unlocking their phone in public to avoid revealing their passcode to anyone who might be watching.
Users can also set up a longer, alphanumeric passcode that’s harder for bad actors to figure out. Device ownersshould also change the passcode immediately if they believe someone else has seen it.
Screen Time settings
Another step someone could consider is a hack not necessarily endorsed by Apple but one that’s been circulating online. Within an iPhone’s Screen Time setting, which allows guardians to set up restrictions on how kids can use the device, there is the option to set up a secondary password that would be required from any user before they couldsuccessfully change an Apple ID.
By enabling this, a thief would be prompted for that secondary password before changing an Apple ID password.
Back up phone regularly
Finally, users can protect themselves by regularly backing up an iPhone – via iCloud or iTunes – so data can be recovered in the case an iPhone is stolen. At the same time, users may want to consider storing important photos or other sensitive files and data in another cloud service, such as Google Photos, Microsoft OneDrive, Amazon Photos or Dropbox.
This won’t stop a bad actor from gaining access to the device, but it should limit some of the fallout if it ever should happen.