• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Apple iOS 16.3 arrives with support for hardware security keys

Lawrence Abrams by Lawrence Abrams
January 23, 2023
Reading Time: 2 mins read
0
Apple iOS 16.3 arrives with support for hardware security keys

Apple logo with a rainbow background

RELATED POSTS

New Horabot campaign takes over victim’s Gmail, Outlook accounts

Windows 11 will let you view phone photos in File Explorer

Harvard Pilgrim Health Care ransomware attack hits 2.5 million people

Apple released iOS 16.3 today with long-awaited support for hardware security keys to provide extra protection against phishing attacks and unauthorized access to your devices.

Hardware security keys are small physical devices that resemble thumb drives and support USB-C (using an adapter) or Near-field communication (NFC) to connect to a Mac or iPhone.

These devices can be used as the additional verification step when using two-factor authentication for Apple IDs rather than the regular six-digit verification code shown on devices.

As security keys are meant to be stored in a keychain or wallet and must be in the presence of a device to authenticate a login, it provides greater protection against threat actors trying to log into your account remotely.

For example, threat actors commonly create phishing attacks that steal Apple ID credentials and the one-time passcodes sent via 2FA verifications.

However, once an Apple ID is configured with a security key, even if an advanced phishing attack can steal your credentials, the remote threat actor cannot log in as they don’t have access to your hardware security key.

Buy JNews
ADVERTISEMENT

Setting up a security key on your iPhone

To use a security key with iOS, Apple requires you to have two keys — one carried with you, and another stored at home or in the office as a spare if you lose one.

To set up security key authentication on an iPhone, go to Settings > Click your name > Password & Security > and then select  Add Security Key.

Adding a security key to iOS
Source: BleepingComputer

You will then be prompted to ensure you have both security keys ready and to add the first one by holding the gold NFC section of your security to the top of your phone.

Once the security key is selected, you will be prompted to link the second security key.

After both are linked, you will be prompted to review the list of devices your Apple ID is currently logged in with and whether you wish to log them out.

When the setup process is completed, any time you need to access your Apple ID, whether for installing apps, making a purchase, or logging in on another device, you will need to press your security key to the top of your phone to complete two-factor authentication.

BleepingComputer has confirmed that the feature works with the YubiKey 5 NFC, YubiKey 5C NFC, and Google Titan.

Apple says that the YubiKey 5Ci and FEITAN ePass K9 NFC security keys are also known to be compatible.

If you no longer wish to use a security key, return to the Security Keys setting and click Remove All Security Keys. Once your security keys are removed, you will automatically revert to the six-digit verification codes.

You can review Apple’s support article on this feature for further information about using security keys with Apple iOS.

Share54Tweet34Pin12
Lawrence Abrams

Lawrence Abrams

Related Posts

Beware: Hackers now use OneNote attachments to spread malware
Cyber Security

New Horabot campaign takes over victim’s Gmail, Outlook accounts

June 1, 2023
Windows 11 will let you view phone photos in File Explorer
Cyber Security

Windows 11 will let you view phone photos in File Explorer

June 1, 2023
Latitude cyberattack leads to data theft at two service providers
Cyber Security

Harvard Pilgrim Health Care ransomware attack hits 2.5 million people

June 1, 2023
Apple fixes recently disclosed zero-days on older iPhones and iPads
Cyber Security

Russia says US hacked thousands of iPhones in iOS zero-click attacks

June 1, 2023
Hackers turn to Google search ads to push info-stealing malware
Cyber Security

Google triples rewards for Chrome sandbox escape chain exploits

June 1, 2023
OSV and the Vulnerability Life Cycle
Cyber Security

Announcing the Chrome Browser Full Chain Exploit Bonus

June 1, 2023

Recommended Stories

Drone goggles maker claims ‘ransomware’ attack after firmware sabotage

Drone goggles maker claims ‘ransomware’ attack after firmware sabotage

May 3, 2023
Microsoft: November updates break ODBC database connections

Microsoft 365 trial offer blocks access to Windows 10 desktops

February 2, 2023
Bitcoin: Evaluating the current market conditions in the wake of FUD

Bitcoin: Evaluating the current market conditions in the wake of FUD

March 23, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • XRP traders, know this about the ‘golden pocket’
  • New Horabot campaign takes over victim’s Gmail, Outlook accounts
  • LTC surprises investors with promising gains; this is what could happen next

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?