Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
Tesla Model 3 got outsold by an EV from a Chinese smartphone brand

Tesla Model 3 got outsold by an EV from a Chinese smartphone brand

25 January 2026
OnePlus 15T leak spills details on a curious camera situation

OnePlus 15T leak spills details on a curious camera situation

25 January 2026
The Lego Pokémon Line Shows Toys Are Only for Rich Adults Now

The Lego Pokémon Line Shows Toys Are Only for Rich Adults Now

25 January 2026
Facebook X (Twitter) Instagram
Just In
  • Tesla Model 3 got outsold by an EV from a Chinese smartphone brand
  • OnePlus 15T leak spills details on a curious camera situation
  • The Lego Pokémon Line Shows Toys Are Only for Rich Adults Now
  • Review: Bambu P1S Combo 3D Printer Review
  • Your WhatsApp voice notes could help screen for early signs of depression
  • How Long Should You Cold Plunge? We Asked Experts (2026)
  • Your charging cable might get a workout if you try ‘Charchery’
  • Review: Phonak Audeo Infinio Ultra Sphere
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » iOS 17.3 will give your iPhone a much-needed security upgrade
News

iOS 17.3 will give your iPhone a much-needed security upgrade

News RoomBy News Room13 December 20236 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
iOS 17.3 will give your iPhone a much-needed security upgrade
Share
Facebook Twitter LinkedIn Pinterest Email

Apple has started testing a new feature that will add an extra layer of protection to your iPhone, something that will also dissuade thieves from snatching your phone. The feature in question is called Stolen Device Protection, and it is currently rolling out with the developer build of iOS 17.3 for users. This comes just one day after iOS 17.2 started rolling out to the public.

“This new feature adds an additional layer of security in the unlikely case that someone has stolen your phone and also obtained your passcode,” says Apple. Once enabled, this feature sets three additional security walls on your iPhone, which are as follows:

Your phone will need your Face ID before you, or a bad actor, can access the passwords saved on your device. However, if your iPhone is in a familiar geographical spot, like your home or office, the security delay protocol is lifted.

Don’t Miss:

This is a crucial guardrail because your Face ID is an authentication window into a lot of services, including financial transactions linked to the Apple Wallet, and more. Moreover, with the adoption of passkeys, all major third parties, including Google services, now ask for your Face ID for convenient identity verification instead of the password hassle.

In fact, the new Stolen Device Protection system only boosts the safety assurance offered by Passkeys. Once activated, the new iOS feature ensures that any attempt to access Apple or external services will only be validated by your Face ID, which means a stolen passcode will be of no use to the bad actor.

The second tier of protection offered by Apple’s new feature is an intentional security delay. If a bad actor has seen your phone passcode and is now trying to change the Apple ID credentials, Apple will force a security delay in the process. This delay will ensure that if your phone has been stolen, you can log in with your Apple ID on another device and track its location using the Find My network. In some countries, you can even file a theft claim with Apple for an iPhone replacement.

But if that’s not feasible and you are concerned about the data on your phone, you can remotely erase all the content stored on your iPhone using a family member’s or another trusted device. The same facility is available via the online iCloud dashboard. The delay also allows the victim to change their Apple ID credentials so that a bad actor can’t do the same.

It’s possible that your iPhone was stolen not merely for re-selling it for a profit. A bad actor can use it for digital crimes and implicate you. The delay in tweaking security credentials would ensure that you have at least some time to report the theft to law enforcement as well as your carrier partner. As an added security precaution, you can mark your device as Lost from the iCloud online dashboard. Doing so locks your iPhone and prevents unauthorized access.

How to enable Stolen Device Protection

Below are the steps that must be followed to activate Stolen Device Protection on your iPhone:

  1. Make sure your iPhone is running the iOS 17.3 build.
  2. Open the Settings app, scroll down, and tap on Face ID & Passcode.
  3. Authenticate your identity by entering the passcode.
  4. On the next page, scroll down and activate Stolen Device Protection.

A mind-blowing scope of damage

In December 2023, an investigation by The Wall Street Journal revealed a low-effort yet extremely destructive pattern of iPhone theft. A pickpocket follows the victim, notes them entering their phone’s passcode, and then steals the device by force — or sneakily.

Next, the swindler quickly changes the Apple ID associated with the stolen iPhone. With that level of system privilege, the robber can deactivate security features like Apple’s Activation Lock or Lost Mode. Doing so is also a criminal necessity. An operational, stolen iPhone has a higher market value compared to one that has been software-locked because it forces the bad actor to sell the stolen device for parts at a much lower value.

Once done, the original owner is blocked from accessing their account and all the data stored on the linked iCloud container. From there, it’s up to the brigand to deal whatever damage they can imagine by accessing the apps and information stored on the stolen iPhone. In one reported case, a bad actor swiped around $10,000 from the victim’s bank account.

Another victim, who lost their iPhone at a bar, had $1,500 transferred using the Venmo app on their phone and thousands of dollars swiped from their bank account. In other cases, money was stolen using the PayPal app. The cutpurse was part of a criminal ring that managed to rob over 40 iPhones and collectively stole approximately $300,000 using stolen iPhones.

Over the past couple of years, police have reportedly come across hundreds of such grievances. It’s a new form of attack that involves a thief either sneaking from over the shoulder, or befriending the victim at a social venue while keeping an eye on any passcode movement for the target device. Pairs or trios of culprits would visit a bar, engage with unsuspecting individuals, frequently persuading them to access Snapchat or another social media app, a detective told The Wall Street Journal.

In certain instances, the offenders discreetly recorded their targets to ensure they captured the precise sequence of actions. In one case, the thief opened an Apple card in the owner’s name. A victim had saved their account passwords in Apple’s iCloud Keychain, a tool that automatically inputs login details after a Face ID, Touch ID, or passcode verification.

Worrying, owing to the system Apple has put in place, banking fraud occurred even if the victim’s biometric data was inaccessible to the perpetrators. For apps that use text-message codes for logins, a method called two-factor authentication, these codes are delivered to the iPhone, which, in these scenarios, would be in the thief’s possession.

It’s scary to imagine just how much damage a thief can do by knowing an iPhone’s passcode and changing the Apple ID credentials quickly after the theft. Victims have lost money, but more importantly, they permanently lost all the memories stored on the iCloud in the form of photos and videos. Stolen Device Protection doesn’t 100% guarantee your iPhone will be safe if it gets stolen, but it does make the outcome much less damning should you find yourself in that situation.

Editors’ Recommendations











Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe best 17-inch laptops
Next Article Max is now available to watch on YouTube Primetime Channels

Related Articles

Tesla Model 3 got outsold by an EV from a Chinese smartphone brand
News

Tesla Model 3 got outsold by an EV from a Chinese smartphone brand

25 January 2026
OnePlus 15T leak spills details on a curious camera situation
News

OnePlus 15T leak spills details on a curious camera situation

25 January 2026
The Lego Pokémon Line Shows Toys Are Only for Rich Adults Now
News

The Lego Pokémon Line Shows Toys Are Only for Rich Adults Now

25 January 2026
Review: Bambu P1S Combo 3D Printer Review
News

Review: Bambu P1S Combo 3D Printer Review

25 January 2026
Your WhatsApp voice notes could help screen for early signs of depression
News

Your WhatsApp voice notes could help screen for early signs of depression

25 January 2026
How Long Should You Cold Plunge? We Asked Experts (2026)
News

How Long Should You Cold Plunge? We Asked Experts (2026)

25 January 2026
Demo
Top Articles
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024107 Views
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024101 Views
Costco partners with Electric Era to bring back EV charging in the U.S.

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202497 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
How Long Should You Cold Plunge? We Asked Experts (2026) News

How Long Should You Cold Plunge? We Asked Experts (2026)

News Room25 January 2026
Your charging cable might get a workout if you try ‘Charchery’ News

Your charging cable might get a workout if you try ‘Charchery’

News Room25 January 2026
Review: Phonak Audeo Infinio Ultra Sphere News

Review: Phonak Audeo Infinio Ultra Sphere

News Room25 January 2026
Most Popular
The Spectacular Burnout of a Solar Panel Salesman

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025136 Views
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024107 Views
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024101 Views
Our Picks
Review: Bambu P1S Combo 3D Printer Review

Review: Bambu P1S Combo 3D Printer Review

25 January 2026
Your WhatsApp voice notes could help screen for early signs of depression

Your WhatsApp voice notes could help screen for early signs of depression

25 January 2026
How Long Should You Cold Plunge? We Asked Experts (2026)

How Long Should You Cold Plunge? We Asked Experts (2026)

25 January 2026

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2026 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.