APPLE has produced a password manager that can alert you of security vulnerabilities using powerful algorithms.
Enable your devices to do more to protect you with this tip.
Apple's Password Monitoring feature flags passwords that are compromised or easily guessable.
Customer support pages explain that Password Monitoring will check your list of saved passwords against "a continuously updated and curated list of passwords known to have been exposed in leaks".
If a user has a password that is at risk or uses a password that becomes a potential risk, Apple will notify them immediately.
Apple users can check their password health in the Settings app.
On your iPhone, navigate to the Settings app and scroll to the Passwords tab – it's marked with a key icon against a grey background.
To open this tab, you'll need to engage with Face ID.
Once you've opened your Keychain, tap Security Recommendations.
In this section, you'll find which of your passwords are at risk, and an explanation of how Apple came to determine a password needs changing.
Most read in Tech
FOOD FOR THOUGHT
Can you solve this puzzle in 20 seconds? You could be record holder
FOOD FOR THOUGHT
Your iPhone has a HIDDEN list that will really creep you out – how to find out
'Biological clock' test promises to reveal how many years you have left to live
Hadron Collider RESTARTING after 3 years sparks Doomsday conspiracies
This information is also accessible on a Macbook laptop or desktop.
Open Safari, tap on the Menu tab, and click Preferences.
A rectangular pop-up will appear – click Password, which stands out with the same key icon used on the iPhone.
Enter your computer password and a list of your stored passwords will appear – a yellow warning symbol should catch your eye if there is trouble with one of your passwords.
Read More On The Sun
I’m a mom of twins who are only half-sisters – even doctors are blown away
While Apple is handling a large amount of password-centric data traffic, they do not actually learn or store user passwords.
The company scrambles the data using cryptography and computational obstructions to minimize the amount of information needed to maximize protection.
Source: Read Full Article