How to use iVerify to protect your iOS device from hackers

Every operating system and device has security tools. If you use a desktop computer, you’ll be familiar with the many types of firewalls, virus and malware checkers, and general security advice on them.

But what about your smartphone and tablet? With more and more people turning to mobile computing and more and more tablets being used as actual computers, the need for a mobile security solution is more urgent than ever.

A new solution for iOS devices has been introduced, called iVerify. For $5, it eliminates the search crowd for free, but you should sacrifice your daily coffee in exchange for peace of mind.

But…. iOS devices cannot be hacked!

There is a dangerous bit of illusion that iOS devices are invulnerable. That the encryption on them makes them invulnerable to any hacking attempt. That was a mistake.

It To be yes, iOS devices have incredibly good encryption features (as long as you remember to turn them on!). But nothing is guaranteed. Errors are always found, including ten in iMessage only.

iVerify monitors for any potential security holes and flags anything it deems suspicious. It also gives you a checklist of what you need to do to lock your phone completely to make it even harder for people to access your phone.

Set up iVerify for iOS

iVerify works on both iPhone and iPad. Buying one will give you a version for the other, so we strongly recommend setting up the app on both devices if you have both.

  • Once the app has been downloaded, open it up and click the green Continue button.
iVerify welcome screen
  • This will then open up the main screen to display what it believes are four key key security areas – Device Scan, Touch ID, Screen Lockand your present iOS version.
iVerify home screen
  • Since I’m using and updating all of them, they’re all green now. But if any of them are disabled or outdated, they will show up in red, which needs immediate attention.
  • If you lightly tap one of the buttons, it will provide you with relevant information.
Additional information pop-ups
  • If you now scroll down the page even further, you will see a checklist of security precautions you can take to lock down your device even more.
Security Precautions Checklist
  • If you click on the first one, Anti-theft protection, you will get a list of iVerify recommendations in that category.
Checklist anti-theft protection
  • The downside is that iVerify doesn’t check if you’ve done these things. It just assumes that you haven’t. If you find something you did, tap it, scroll to the bottom, then tap I Rate This. It will then be marked as complete.
I rated this button
  • For a task you haven’t completed, tap it and the next page will give you full instructions on how to achieve it, including a button to take you to the device settings.
Instructions to enable Content Blocker
  • When you’re done, go back to iVerify, press I Rate This, and it will be marked as complete. Move on to the next section and repeat.

iVerify detects threats to your iOS device

Threat detected alert

When iVerify detects a threat, it generates a unique link back to Trail of Bits, the developer who created iVerify. This link provides you with information on what to do to remove the threat, as well as report a threat to Trail of Bits, to improve its threat database.

As the screen says, open the link on another uninfected device, close the infected device and follow the instructions in the given link.

Not 100% perfect – But better than nothing

This should not be considered a perfect solution against spyware, malware and hackers. Nothing is perfect. Threats are always evolving and, of course, if a government or state-backed bad guy is involved, then things like iVerify will be rendered useless.

But 99% of us won’t be the target of authoritarian governments or someone using a voice scrambling device asking them to be paid a billion dollars in exchange for not messing up the grid. For the average person, iVerify can prove to be a very valuable resource.

Leave a Reply

Your email address will not be published.