SlideShare a Scribd company logo
1 of 10
Download to read offline
HOW TO (SAFELY) CUT 
THE CORD WITH YOUR 
OLD iPHONE
Excited for the new iPhone 6? 
With Apple reportedly building 80 million new 
iPhones this year, it’s safe to say that 
You’re not alone!
What happens to your old phone when you upgrade? 
Whether you’re selling, donating or recycling your old phone, the 
personal data stored on it doesn’t disappear just because you stop 
using it every day. 
?
Now a stranger has your phone. So what? 
As a handful of celebrities just learned, privacy is no joke when it comes 
to the private photos, emails and data that are living on your iPhone.
How do you give your old phone a permanent scrub? 
Hint: it takes more than just dropping files into the on-screen 
garbage can.
 
 
1 
 
 
 
 
 
 
BACK UP ALL YOUR DATA 
 
 
 
 
Use phone backup software to ensure all your 
photos, contacts and other data are safely stored 
where you can retrieve them. You can backup the 
data by syncing to iTunes on your computer, using 
iCloud or third-party backup services, like Lookout. 
 
 
 
 
 
 
 
 
 

2 
ERASE THE DATA 
To completely erase the device and turn off iCloud, 
iMessage, FaceTime and other services go to Settings > 
General > Reset and tap Erase All Content and Settings. If 
you’re on iOS 7, you’ll need to turn off the Find My Phone 
feature before doing this. This process returns the device to 
state it was when it was shipped from the factory. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

3 
UNLINK APPS AND ACCOUNTS 
Beyond the data that resides on the phone, you also want to 
make sure no one can access your Facebook or any other 
accounts you accessed on that device that authenticated you 
based on the iPhone's unique hardware ID. You should visit 
the websites of those apps to unlink the phone from your 
account. You can also unregister your iPhone from Apple’s 
website so it is no longer linked to your Apple ID by visiting: 
https://supportprofile.apple.com/MySupportProfile.do and 
clicking on edit products after you’ve logged in.
4 
REMOVE THE SIM CARD 
Think of the SIM card as your mobile identity. 
It’s better off staying with you. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

For more mobile security tips, follow

More Related Content

What's hot

5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady AppsLookout
 
How to Recover Deleted Videos on iPhone
How to Recover Deleted Videos on iPhoneHow to Recover Deleted Videos on iPhone
How to Recover Deleted Videos on iPhoneEvelyn Kerley
 
WhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POCWhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POCE Hacking
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
How to install cell phone spyx
How to install cell phone spyxHow to install cell phone spyx
How to install cell phone spyxdevsteam
 
Forgot restrictions passcode - How to Reset Restrictions Passcode on iPhone
Forgot restrictions passcode - How to Reset Restrictions Passcode on iPhoneForgot restrictions passcode - How to Reset Restrictions Passcode on iPhone
Forgot restrictions passcode - How to Reset Restrictions Passcode on iPhonemoli he
 
Best Cell Phone Spyware - HelloSpy installation on Android phone
Best Cell Phone Spyware - HelloSpy installation on Android phoneBest Cell Phone Spyware - HelloSpy installation on Android phone
Best Cell Phone Spyware - HelloSpy installation on Android phonedaisyvo87
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14Naval OPSEC
 
How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?limitlessusa
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 Thycotic
 
Recover data from iOS device
Recover data from iOS deviceRecover data from iOS device
Recover data from iOS deviceenrique engleng
 
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016
2FA, WTF? -  Phil Nash - Codemotion Amsterdam 20162FA, WTF? -  Phil Nash - Codemotion Amsterdam 2016
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016Codemotion
 
Iphone and ipad kids safety
Iphone and ipad kids safetyIphone and ipad kids safety
Iphone and ipad kids safetyUDIA ORG.
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security snobbishmishap958
 

What's hot (20)

How To Identify A Fake App In Playstore
How To Identify A Fake App In PlaystoreHow To Identify A Fake App In Playstore
How To Identify A Fake App In Playstore
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 
How to Recover Deleted Videos on iPhone
How to Recover Deleted Videos on iPhoneHow to Recover Deleted Videos on iPhone
How to Recover Deleted Videos on iPhone
 
Jail breaking
Jail breakingJail breaking
Jail breaking
 
WhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POCWhatsApp Chat Hacking/Stealing POC
WhatsApp Chat Hacking/Stealing POC
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
How to install cell phone spyx
How to install cell phone spyxHow to install cell phone spyx
How to install cell phone spyx
 
Forgot restrictions passcode - How to Reset Restrictions Passcode on iPhone
Forgot restrictions passcode - How to Reset Restrictions Passcode on iPhoneForgot restrictions passcode - How to Reset Restrictions Passcode on iPhone
Forgot restrictions passcode - How to Reset Restrictions Passcode on iPhone
 
Best Cell Phone Spyware - HelloSpy installation on Android phone
Best Cell Phone Spyware - HelloSpy installation on Android phoneBest Cell Phone Spyware - HelloSpy installation on Android phone
Best Cell Phone Spyware - HelloSpy installation on Android phone
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
iCloud
iCloudiCloud
iCloud
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
 
Recover data from iOS device
Recover data from iOS deviceRecover data from iOS device
Recover data from iOS device
 
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016
2FA, WTF? -  Phil Nash - Codemotion Amsterdam 20162FA, WTF? -  Phil Nash - Codemotion Amsterdam 2016
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016
 
Iphone and ipad kids safety
Iphone and ipad kids safetyIphone and ipad kids safety
Iphone and ipad kids safety
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
News Bytes - June 2015 - Null HYD
News Bytes - June 2015 - Null HYDNews Bytes - June 2015 - Null HYD
News Bytes - June 2015 - Null HYD
 

Viewers also liked

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
タイムボックス制約付きインクリメンタル開発
タイムボックス制約付きインクリメンタル開発タイムボックス制約付きインクリメンタル開発
タイムボックス制約付きインクリメンタル開発HIDEKAZU MATSUURA
 
Axa early research and concepts
Axa early research and conceptsAxa early research and concepts
Axa early research and conceptsEdward Mc Elroy
 
Jani voert drastische boekhoudkundige wijziging door bij firma
Jani voert drastische boekhoudkundige wijziging door bij firmaJani voert drastische boekhoudkundige wijziging door bij firma
Jani voert drastische boekhoudkundige wijziging door bij firmaThierry Debels
 
Making Wearables Tip
Making Wearables TipMaking Wearables Tip
Making Wearables TipRichie Etwaru
 
А. Илларионов - Предчувствие катастрофы
А. Илларионов - Предчувствие катастрофыА. Илларионов - Предчувствие катастрофы
А. Илларионов - Предчувствие катастрофыguest743108
 
Fietsenwinkel Niels Albert loopt als... een trein
Fietsenwinkel Niels Albert loopt als... een treinFietsenwinkel Niels Albert loopt als... een trein
Fietsenwinkel Niels Albert loopt als... een treinThierry Debels
 
Leveraging Social Media Platforms; Techniques and Tools to Monitor and Measur...
Leveraging Social Media Platforms; Techniques and Tools to Monitor and Measur...Leveraging Social Media Platforms; Techniques and Tools to Monitor and Measur...
Leveraging Social Media Platforms; Techniques and Tools to Monitor and Measur...Michael Pranikoff
 
A wearables story mobile dev and test 2016
A wearables story mobile dev and test 2016A wearables story mobile dev and test 2016
A wearables story mobile dev and test 2016GerieOwen
 
【Interop tokyo 2014】 回線の有効活用を可能にするCisco iWANによる最新WAN構築
【Interop tokyo 2014】  回線の有効活用を可能にするCisco iWANによる最新WAN構築【Interop tokyo 2014】  回線の有効活用を可能にするCisco iWANによる最新WAN構築
【Interop tokyo 2014】 回線の有効活用を可能にするCisco iWANによる最新WAN構築シスコシステムズ合同会社
 
CES 2016: The State of Fitness Wearables
CES 2016: The State of Fitness WearablesCES 2016: The State of Fitness Wearables
CES 2016: The State of Fitness WearablesPrecor
 
Account Management Best Practices: Strategies, Tactics & More to Increase Ret...
Account Management Best Practices: Strategies, Tactics & More to Increase Ret...Account Management Best Practices: Strategies, Tactics & More to Increase Ret...
Account Management Best Practices: Strategies, Tactics & More to Increase Ret...Heinz Marketing Inc
 
eMarketer Webinar: Wearables—10 Insights on Device Adoption and Business Oppo...
eMarketer Webinar: Wearables—10 Insights on Device Adoption and Business Oppo...eMarketer Webinar: Wearables—10 Insights on Device Adoption and Business Oppo...
eMarketer Webinar: Wearables—10 Insights on Device Adoption and Business Oppo...eMarketer
 
Safdarjang (or Safdarjung) Tomb - one of New Delhi's most beautiful historica...
Safdarjang (or Safdarjung) Tomb - one of New Delhi's most beautiful historica...Safdarjang (or Safdarjung) Tomb - one of New Delhi's most beautiful historica...
Safdarjang (or Safdarjung) Tomb - one of New Delhi's most beautiful historica...Amit Ranjan
 
The State of Wearables Today
The State of Wearables TodayThe State of Wearables Today
The State of Wearables TodayValencell, Inc
 
Seminário03 - Por uma prática docente crítica e construtiva
Seminário03 - Por uma prática docente crítica e construtivaSeminário03 - Por uma prática docente crítica e construtiva
Seminário03 - Por uma prática docente crítica e construtivaSharllesGuedes
 

Viewers also liked (20)

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
タイムボックス制約付きインクリメンタル開発
タイムボックス制約付きインクリメンタル開発タイムボックス制約付きインクリメンタル開発
タイムボックス制約付きインクリメンタル開発
 
Axa early research and concepts
Axa early research and conceptsAxa early research and concepts
Axa early research and concepts
 
Jani voert drastische boekhoudkundige wijziging door bij firma
Jani voert drastische boekhoudkundige wijziging door bij firmaJani voert drastische boekhoudkundige wijziging door bij firma
Jani voert drastische boekhoudkundige wijziging door bij firma
 
Making Wearables Tip
Making Wearables TipMaking Wearables Tip
Making Wearables Tip
 
А. Илларионов - Предчувствие катастрофы
А. Илларионов - Предчувствие катастрофыА. Илларионов - Предчувствие катастрофы
А. Илларионов - Предчувствие катастрофы
 
Fietsenwinkel Niels Albert loopt als... een trein
Fietsenwinkel Niels Albert loopt als... een treinFietsenwinkel Niels Albert loopt als... een trein
Fietsenwinkel Niels Albert loopt als... een trein
 
Leveraging Social Media Platforms; Techniques and Tools to Monitor and Measur...
Leveraging Social Media Platforms; Techniques and Tools to Monitor and Measur...Leveraging Social Media Platforms; Techniques and Tools to Monitor and Measur...
Leveraging Social Media Platforms; Techniques and Tools to Monitor and Measur...
 
A wearables story mobile dev and test 2016
A wearables story mobile dev and test 2016A wearables story mobile dev and test 2016
A wearables story mobile dev and test 2016
 
Social media
Social mediaSocial media
Social media
 
【Interop tokyo 2014】 回線の有効活用を可能にするCisco iWANによる最新WAN構築
【Interop tokyo 2014】  回線の有効活用を可能にするCisco iWANによる最新WAN構築【Interop tokyo 2014】  回線の有効活用を可能にするCisco iWANによる最新WAN構築
【Interop tokyo 2014】 回線の有効活用を可能にするCisco iWANによる最新WAN構築
 
CES 2016: The State of Fitness Wearables
CES 2016: The State of Fitness WearablesCES 2016: The State of Fitness Wearables
CES 2016: The State of Fitness Wearables
 
Account Management Best Practices: Strategies, Tactics & More to Increase Ret...
Account Management Best Practices: Strategies, Tactics & More to Increase Ret...Account Management Best Practices: Strategies, Tactics & More to Increase Ret...
Account Management Best Practices: Strategies, Tactics & More to Increase Ret...
 
eMarketer Webinar: Wearables—10 Insights on Device Adoption and Business Oppo...
eMarketer Webinar: Wearables—10 Insights on Device Adoption and Business Oppo...eMarketer Webinar: Wearables—10 Insights on Device Adoption and Business Oppo...
eMarketer Webinar: Wearables—10 Insights on Device Adoption and Business Oppo...
 
Safdarjang (or Safdarjung) Tomb - one of New Delhi's most beautiful historica...
Safdarjang (or Safdarjung) Tomb - one of New Delhi's most beautiful historica...Safdarjang (or Safdarjung) Tomb - one of New Delhi's most beautiful historica...
Safdarjang (or Safdarjung) Tomb - one of New Delhi's most beautiful historica...
 
The State of Wearables Today
The State of Wearables TodayThe State of Wearables Today
The State of Wearables Today
 
A Globo e os #panamapapers
A Globo e os #panamapapersA Globo e os #panamapapers
A Globo e os #panamapapers
 
Seminário03 - Por uma prática docente crítica e construtiva
Seminário03 - Por uma prática docente crítica e construtivaSeminário03 - Por uma prática docente crítica e construtiva
Seminário03 - Por uma prática docente crítica e construtiva
 

Similar to How to (Safely) Cut the Cord With Your Old iPhone

How to ensure your mobile data is secured
How to ensure your mobile data is securedHow to ensure your mobile data is secured
How to ensure your mobile data is securedSoftware Assurance LLC
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossWireless Solutions NY
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
How to track my i phone if its stolen
How to track my i phone if its stolenHow to track my i phone if its stolen
How to track my i phone if its stolentradeintechforcash
 
HOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSING
HOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSINGHOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSING
HOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSINGMegan Llyod
 
How to Unlock iPhone Passcode
How to Unlock iPhone PasscodeHow to Unlock iPhone Passcode
How to Unlock iPhone PasscodeEmmaSmith1993
 
Imei tracker software
Imei tracker softwareImei tracker software
Imei tracker softwareGerryspeck
 
How to reset i phone without apple id
How to reset i phone without apple idHow to reset i phone without apple id
How to reset i phone without apple idLeila1229
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – andRandyBett
 
How to Retrieve Contacts from iphone
How to Retrieve Contacts from iphoneHow to Retrieve Contacts from iphone
How to Retrieve Contacts from iphoneHolidayzqq
 
Tips and tricks from the experts on iPhone Data Recovery.pptx
Tips and tricks from the experts on iPhone Data Recovery.pptxTips and tricks from the experts on iPhone Data Recovery.pptx
Tips and tricks from the experts on iPhone Data Recovery.pptxAlexRodes
 
Forgot iPhone Passcode without Restore -How to Reset It without Passcode
Forgot iPhone Passcode without Restore -How to Reset It without PasscodeForgot iPhone Passcode without Restore -How to Reset It without Passcode
Forgot iPhone Passcode without Restore -How to Reset It without PasscodeElinall
 
Restore iPhone data easily
Restore iPhone data easilyRestore iPhone data easily
Restore iPhone data easilyalbertdisuza
 
A Complete Guide to Cyber Hygiene
A Complete Guide to Cyber HygieneA Complete Guide to Cyber Hygiene
A Complete Guide to Cyber Hygienetechugo
 
15 cool i phone hacks to try
15 cool i phone hacks to try15 cool i phone hacks to try
15 cool i phone hacks to tryShamraizQamer
 
How to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhoneHow to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhoneHowtonia
 
Fonepaw iphone data recoevry
Fonepaw iphone data recoevryFonepaw iphone data recoevry
Fonepaw iphone data recoevryJamesDanial
 
I phone tips for new and advanced users
I phone tips for new and advanced usersI phone tips for new and advanced users
I phone tips for new and advanced usersDianne Rabago Abaya
 

Similar to How to (Safely) Cut the Cord With Your Old iPhone (20)

How to ensure your mobile data is secured
How to ensure your mobile data is securedHow to ensure your mobile data is secured
How to ensure your mobile data is secured
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
How to track my i phone if its stolen
How to track my i phone if its stolenHow to track my i phone if its stolen
How to track my i phone if its stolen
 
HOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSING
HOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSINGHOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSING
HOW TO LOCATE YOUR IPHONE WHEN IT GOES MISSING
 
How to Unlock iPhone Passcode
How to Unlock iPhone PasscodeHow to Unlock iPhone Passcode
How to Unlock iPhone Passcode
 
Imei tracker software
Imei tracker softwareImei tracker software
Imei tracker software
 
How to reset i phone without apple id
How to reset i phone without apple idHow to reset i phone without apple id
How to reset i phone without apple id
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
 
How to Retrieve Contacts from iphone
How to Retrieve Contacts from iphoneHow to Retrieve Contacts from iphone
How to Retrieve Contacts from iphone
 
Tips and tricks from the experts on iPhone Data Recovery.pptx
Tips and tricks from the experts on iPhone Data Recovery.pptxTips and tricks from the experts on iPhone Data Recovery.pptx
Tips and tricks from the experts on iPhone Data Recovery.pptx
 
Forgot iPhone Passcode without Restore -How to Reset It without Passcode
Forgot iPhone Passcode without Restore -How to Reset It without PasscodeForgot iPhone Passcode without Restore -How to Reset It without Passcode
Forgot iPhone Passcode without Restore -How to Reset It without Passcode
 
Restore iPhone data easily
Restore iPhone data easilyRestore iPhone data easily
Restore iPhone data easily
 
A Complete Guide to Cyber Hygiene
A Complete Guide to Cyber HygieneA Complete Guide to Cyber Hygiene
A Complete Guide to Cyber Hygiene
 
15 cool i phone hacks to try
15 cool i phone hacks to try15 cool i phone hacks to try
15 cool i phone hacks to try
 
How to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhoneHow to Set up a Personal Hotspot on iPhone
How to Set up a Personal Hotspot on iPhone
 
Confused by your new phon1
Confused by your new phon1Confused by your new phon1
Confused by your new phon1
 
Fonepaw iphone data recoevry
Fonepaw iphone data recoevryFonepaw iphone data recoevry
Fonepaw iphone data recoevry
 
I phone tips for new and advanced users
I phone tips for new and advanced usersI phone tips for new and advanced users
I phone tips for new and advanced users
 
Enjoying Your Unique IPhone
Enjoying Your Unique IPhoneEnjoying Your Unique IPhone
Enjoying Your Unique IPhone
 

More from Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the OlympicsLookout
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise ProductsLookout
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for GoodLookout
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?Lookout
 
Dragon lady
Dragon ladyDragon lady
Dragon ladyLookout
 
Dragon Lady
Dragon LadyDragon Lady
Dragon LadyLookout
 
History of Lookout
History of LookoutHistory of Lookout
History of LookoutLookout
 
Scaling Up Lookout
Scaling Up LookoutScaling Up Lookout
Scaling Up LookoutLookout
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Lookout
 
Sécurité Mobile 101
Sécurité Mobile 101Sécurité Mobile 101
Sécurité Mobile 101Lookout
 

More from Lookout (19)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Dragon lady
Dragon ladyDragon lady
Dragon lady
 
Dragon Lady
Dragon LadyDragon Lady
Dragon Lady
 
History of Lookout
History of LookoutHistory of Lookout
History of Lookout
 
Scaling Up Lookout
Scaling Up LookoutScaling Up Lookout
Scaling Up Lookout
 
Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21Trial by Fire: Security @ DEF CON 21
Trial by Fire: Security @ DEF CON 21
 
Sécurité Mobile 101
Sécurité Mobile 101Sécurité Mobile 101
Sécurité Mobile 101
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

How to (Safely) Cut the Cord With Your Old iPhone

  • 1. HOW TO (SAFELY) CUT THE CORD WITH YOUR OLD iPHONE
  • 2. Excited for the new iPhone 6? With Apple reportedly building 80 million new iPhones this year, it’s safe to say that You’re not alone!
  • 3. What happens to your old phone when you upgrade? Whether you’re selling, donating or recycling your old phone, the personal data stored on it doesn’t disappear just because you stop using it every day. ?
  • 4. Now a stranger has your phone. So what? As a handful of celebrities just learned, privacy is no joke when it comes to the private photos, emails and data that are living on your iPhone.
  • 5. How do you give your old phone a permanent scrub? Hint: it takes more than just dropping files into the on-screen garbage can.
  • 6.   1       BACK UP ALL YOUR DATA     Use phone backup software to ensure all your photos, contacts and other data are safely stored where you can retrieve them. You can backup the data by syncing to iTunes on your computer, using iCloud or third-party backup services, like Lookout.          
  • 7. 2 ERASE THE DATA To completely erase the device and turn off iCloud, iMessage, FaceTime and other services go to Settings > General > Reset and tap Erase All Content and Settings. If you’re on iOS 7, you’ll need to turn off the Find My Phone feature before doing this. This process returns the device to state it was when it was shipped from the factory.                      
  • 8. 3 UNLINK APPS AND ACCOUNTS Beyond the data that resides on the phone, you also want to make sure no one can access your Facebook or any other accounts you accessed on that device that authenticated you based on the iPhone's unique hardware ID. You should visit the websites of those apps to unlink the phone from your account. You can also unregister your iPhone from Apple’s website so it is no longer linked to your Apple ID by visiting: https://supportprofile.apple.com/MySupportProfile.do and clicking on edit products after you’ve logged in.
  • 9. 4 REMOVE THE SIM CARD Think of the SIM card as your mobile identity. It’s better off staying with you.                      
  • 10. For more mobile security tips, follow