Apple has released its 16.3 iOS version today with support for hardware security keys thus enhancing extra security against phishing attacks and access threats on devices.
Hardware security keys are physical devices tiny in size and resemble pen drives. It does support USB-C or NFC to connect with iPhone or Mac devices. These hardware security keys can be used as an extra-layer of authentication while a 2FA is setup instead of the six-digit verification code.
The hardware security keys are stored in a keychain or wallet and this physical device makes things difficult for threat actors as they need to have physical access to this device to breach your online account.
For example, even if threat actors have stolen your Apple credentials they won’t be able to exploit it without the hardware security key.
To setup hardware security, users must have two keys – one with the them and the other at home or in the office as a spare key.
On your iPhone,
Once you have both the keys, add them by holding the gold NFC section of your security, once the first key is done the prompt for second key will appear. After linking both the keys, review the list of devices your Apple ID is currently logged in and you can choose to log out and log in again or leave it as such.
In Apple iOS 16.3, the keys will be required for installing apps, making purchases, or logging into another device. You just need to press your security key on top of your iPhone to complete the authentication process.
If you want to revert the hardware security key settings in Apple iOS 16.3, navigate to key settings and select Remove All Security Keys.
If you have been a victim of a phishing attack or if you don’t have a habit of having strong passwords, updating passwords periodically, or a popular person whose account can be hacked please ensure you give a try on these hardware security keys for better security and protection of your accounts.
Apple iOS 16.3 is here with the most requested support for hardware security keys, hope with this update the number of phishing attacks and its victims will come down reasonably.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.
You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…