The new system means that people logging into those services on their iPhone, iPad or Mac will be required to enter their username and password plus a verification code that Apple will send to a device.
Computer security experts recommend two-step verification as standard practice because it requires someone to know something (a username and password) and have something (such as iPhone with a specific phone number so that a verification code can be sent as a text message).
Such a system can foil hackers who try to access an account with a stolen password.
Apple has previously introduced two-step verification for people signing into their iCloud account.
Apple has introduced new security checks for its cloud!
One of the problems with the high-profile Hollywood hack of last year, in which celebrities including Jennifer Lawrence had personal photos stolen and distributed online, was that many people use the same email address and password across multiple accounts.
So, if a hacker steals a person’s password from a website with weak security, they can then try that combination at other services giving them access to a person’s account by just logging in.
If you want to make sure you don’t join Jennifer Lawrence as a victim of hackers, the first rule of computer security it to choose hard to guess passwords and don’t use the same password for multiple accounts.
Also, if a service offers it, make sure you use two-step verification.
And if you’re a high-profile Hollywood actor, don’t leave naked photos on any device connected to the internet — just pop them on a memory stick and keep it under a mattress like Grandma used to do.