I-PANIC

Apple warning for BILLIONS of iPhone owners – check your settings or it could get you hacked

APPLE has issued an urgent warning to customers to make sure their passwords have not been hacked.

Apple users can find out if they’re vulnerable to a security breach in a few simple steps.

Getty Images - Getty
Apple checks passwords against a database of leaks

Apple’s Password Monitoring feature flags passwords that are compromised or easily guessable.

explain that Password Monitoring will check your list of saved passwords against “a continuously updated and curated list of passwords known to have been exposed in leaks”.

If a user has a password that is at risk or uses a password that becomes a potential risk, Apple will notify them immediately.

Apple users can check their password health in the Settings app.

On your iPhone, navigate to the Settings app and scroll to the Passwords tab – it’s marked with a key icon against a grey background.

To open this tab, you’ll need to engage with Face ID.

Once you’ve opened your Keychain, tap Security Recommendations.

In this section, you’ll find which of your passwords are at risk, and an explanation of how Apple came to determine a password needs changing.

Most read in Tech

GOOG THINKING
Google reveals money-saving Boxing Day 'fridge trick' for millions of Brits
NIGHT TO REMEMBER
Saturn's rings vanish and twin Blood Moons – must-see 2025 space events

This information is also accessible on a Macbook laptop or desktop.

Open Safari, tap on the Menu tab, and click Preferences.

A rectangular pop-up will appear – click Password, which stands out with the same key icon used on the iPhone.

Enter your computer password and a list of your stored passwords will appear – a yellow warning symbol should catch your eye if there is trouble with one of your passwords.

Read More On The Sun

SCRAMBLED EGGS

I'm a mom of twins who are only half-sisters - even doctors are blown away

While Apple is handling a large amount of password-centric data traffic, they do not actually learn or store user passwords.

The company scrambles the data using cryptography and computational obstructions to minimize the amount of information needed to maximize protection.

Exit mobile version