{"id":721,"date":"2012-12-12T10:01:16","date_gmt":"2012-12-12T15:01:16","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=721"},"modified":"2019-11-15T07:29:04","modified_gmt":"2019-11-15T12:29:04","slug":"must-have-iphone-security-apps","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/must-have-iphone-security-apps\/721\/","title":{"rendered":"Must-Have iPhone Security Apps"},"content":{"rendered":"<p>Apple popularized the app-store concept and the iPhone and its companion store have gained a reputation for security over the years. While iOS on its own is quite secure, there are still plenty of security apps available to help fill in the gaps and give users a broad set of choices for securing their phones and sensitive data. Here are some of the most useful security apps to be found in the iTunes App Store.<\/p>\n<ol>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052216\/Screen-Shot-2012-12-11-at-2.12.06-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-807\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052216\/Screen-Shot-2012-12-11-at-2.12.06-PM.png\" alt=\"Find My iPhone\" width=\"74\" height=\"74\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/find-my-iphone\/id376101648?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">FIND MY IPHONE<\/a><\/strong>: Perhaps the most essential security\/geolocation application for the iPhone, Find My iPhone, provided by Apple, allows users to track the location of their device. The app is key for users who either hope to retrieve their lost phone or erase any sensitive information that may have been left on a lost phone. Through a user\u2019s iCloud account, the app displays lost devices on a map, can get them to play a sound if left nearby, can remotely lock devices and even erase their personal data.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052216\/Screen-Shot-2012-12-11-at-2.14.41-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-809\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052216\/Screen-Shot-2012-12-11-at-2.14.41-PM.png\" alt=\"contactspro\" width=\"70\" height=\"70\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/contactspro-lite-groups-more!\/id385964740?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">CONTACTSPRO<\/a><\/strong>: ContactsPro, available for both iPhone and iPad, allows users to hide selected contacts, photos and other information behind what they call an \u201cunlimited\u201d number of passcode protected areas.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052216\/Screen-Shot-2012-12-11-at-2.18.24-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-808\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052216\/Screen-Shot-2012-12-11-at-2.18.24-PM.png\" alt=\"lookout\" width=\"71\" height=\"70\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/lookout-free\/id434893913?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">LOOKOUT<\/a><\/strong>: Another from the security\/geolocation camp, Lookout \u2013 like Find My iPhone \u2013 is a free way for users to find their lost iPhone or iPad. The app allows users to back up and save their contacts, manage their device over the web and most importantly, find their device. The latest version of the app boasts a new function Signal Fire \u2013 which Lookout claims automatically saves the phone\u2019s location when the battery gets low to better inform users where it may be.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052216\/Screen-Shot-2012-12-11-at-2.22.17-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-810\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052216\/Screen-Shot-2012-12-11-at-2.22.17-PM.png\" alt=\"NQ Mobile Vault\" width=\"75\" height=\"73\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/nq-vault-hide-private-pictures\/id513852898?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">NQ MOBILE VAULT<\/a><\/strong> : Similar to ContactsPro, NQ Mobile\u2019s Vault app allows users to hide pictures, videos and messages they don\u2019t want others to see. The app is free, yet some premium functions, including a feature that photographs anyone who enters the wrong password on your phone can be available for $1.99.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052215\/Screen-Shot-2012-12-11-at-2.23.51-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-811\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052215\/Screen-Shot-2012-12-11-at-2.23.51-PM.png\" alt=\"RSA Secure id\" width=\"76\" height=\"74\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/rsa-securid-software-token\/id318038618?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">RSA SECURID SOFTWARE TOKEN<\/a><\/strong>: RSA\u2019s SecureID Token gives your iPhone a two-factor authenticator to deploy software tokens to other RSA resources like VPNs, WLANs and web apps on the go.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052215\/Screen-Shot-2012-12-11-at-2.25.34-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-812\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052215\/Screen-Shot-2012-12-11-at-2.25.34-PM.png\" alt=\"Hotspot Shield\" width=\"77\" height=\"74\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/hotspot-shield-vpn\/id443369807?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">HOTSPOT SHIELD VPN<\/a><\/strong>: Hotspot Shield offers users an iPhone VPN alternative, allowing users to connect to the internet using Wi-Fi hotspots all while encrypting your traffic and hiding your IP address. The service also has its own spam, phishing and malware protection notifications.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052215\/Screen-Shot-2012-12-11-at-2.30.57-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-813\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052215\/Screen-Shot-2012-12-11-at-2.30.57-PM.png\" alt=\"Gadget Trak\" width=\"74\" height=\"75\"><\/a>GADGETTRAK<\/strong>: GadgetTrak offers users an alternative to Find My iPhone. Users can wait until after their phone has been stolen and log-in to their account on any browser to remotely enable their phone\u2019s tracking. The service will show your phone on a map and even snap a photograph of the thief if the user requests it to.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052215\/Screen-Shot-2012-12-11-at-2.33.16-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-814\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052215\/Screen-Shot-2012-12-11-at-2.33.16-PM.png\" alt=\"Firewall IP\" width=\"50\" height=\"53\"><\/a><a href=\"http:\/\/cydia.saurik.com\/\" target=\"_blank\" rel=\"noopener nofollow\">FIREWALL IP<\/a><\/strong>: Firewall IP is an \u201capp\u201d available only in the Cydia Store, a directory of applications for jailbroken iPhones. After ponying up $1.99, Firewall allows users to block outgoing connections (both TCP &amp; UDP), analytic providers, ads and even which of your apps users want connecting while on a cellular network.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052214\/Screen-Shot-2012-12-11-at-2.46.42-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-815\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052214\/Screen-Shot-2012-12-11-at-2.46.42-PM.png\" alt=\"iLOCALIS\" width=\"57\" height=\"56\"><\/a><a href=\"http:\/\/cydia.saurik.com\/\" target=\"_blank\" rel=\"noopener nofollow\">iLOCALIS<\/a><\/strong>: Also exclusively available in the Cydia Store, iLocalis allows owners of jailbroken phones to keep track of their phones if they\u2019re stolen or lost and also gives them the ability to create and restore remote backups, remote wipe data, make remote calls and activate remote call forwarding.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052214\/Screen-Shot-2012-12-11-at-3.08.37-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-817\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052214\/Screen-Shot-2012-12-11-at-3.08.37-PM.png\" alt=\"Splash ID\" width=\"74\" height=\"71\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/splashid-safe-for-iphone\/id284334840?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">SPLASH ID<\/a><\/strong>: SplashID bills its app as a safe for users\u2019 information \u2013 usernames, passwords, credit card data, account numbers and prescriptions can all be locked away under 256-bit Blowfish encryption. The app also offers an automatic password generator, backup\/sync and manual IP address synchronization.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052214\/Screen-Shot-2012-12-11-at-3.09.50-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-818\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052214\/Screen-Shot-2012-12-11-at-3.09.50-PM.png\" alt=\"Cisco Any Connect\" width=\"74\" height=\"73\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/cisco-anyconnect\/id392790924?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">CISCO ANYCONNECT<\/a><\/strong>: Cisco\u2019s AnyConnect Secure Mobility Client gives its users an app to deploy encrypted network connectivity on the go. Using software developed by the OpenSSL Project and developers Eric Young and Tim Hudson, the app establishes a secure connection for TCP-based applications via Datagram Transport Layer Security (DTLS).<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052213\/Screen-Shot-2012-12-11-at-3.11.01-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-819\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052213\/Screen-Shot-2012-12-11-at-3.11.01-PM.png\" alt=\"Junos\" width=\"78\" height=\"77\"><\/a>JUNOS PULSE<\/strong>: Another from the SSL VPN camp, JunOS Pulse allows users to connect to their VPN via Juniper Networks remotely. Using the JunOS Pulse Mobile Security Suite and this app, devices can be managed over the air, located, locked and wiped.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052213\/Screen-Shot-2012-12-11-at-3.12.09-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-820\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052213\/Screen-Shot-2012-12-11-at-3.12.09-PM.png\" alt=\"The Vault\" width=\"69\" height=\"71\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/vault-secure-document-data\/id436982968?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">THE VAULT<\/a><\/strong>: Aptly named, The Vault acts as an encrypted storage service for your phone. The free app stores information like passwords, logins and photographs locally, instead of in the cloud.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052213\/Screen-Shot-2012-12-11-at-3.13.03-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-821\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052213\/Screen-Shot-2012-12-11-at-3.13.03-PM.png\" alt=\"Wickr\" width=\"70\" height=\"69\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/wickr-secure-private-self\/id528962154?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">WICKR<\/a><\/strong>: Billed as a secure and private messenger, Wickr offers military-grade encryption (AES 256 and RSA 4096) and lets users determine who can read their messages, where and for how long. The heavy-duty app destroys metadata from captured videos and photographs and encrypts and anonymizes messages between those who use the app.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052213\/Screen-Shot-2012-12-11-at-3.14.09-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-822\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052213\/Screen-Shot-2012-12-11-at-3.14.09-PM.png\" alt=\"1PasswordPro\" width=\"79\" height=\"77\"><\/a>1PASSWORD PRO<\/strong>: This app allows users to securely store their website logins, passwords, credit cards and membership numbers through what the application calls \u201chardware-accelerated AES encryption\u201d and auto-lock. The app will also backup data and synchronize your data with your Mac, or if you have it, Dropbox service.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052212\/Screen-Shot-2012-12-11-at-3.16.50-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-823\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052212\/Screen-Shot-2012-12-11-at-3.16.50-PM.png\" alt=\"Spam Arrest\" width=\"78\" height=\"78\"><\/a>SPAM ARREST<\/strong>: An extension of the Spam Arrest service \u2013 a service which sorts through e-mail, separating legitimate emails from spam \u2013 this app allows users to access their account directly from their iPhone and allows them to review unverified mail, providing they\u2019ve purchased a subscription.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052212\/Screen-Shot-2012-12-11-at-3.19.11-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-824\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052212\/Screen-Shot-2012-12-11-at-3.19.11-PM.png\" alt=\"Secure Folder Pro\" width=\"70\" height=\"68\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/secure-folder-pro\/id493537578?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">SECURE FOLDER PRO<\/a><\/strong>: Secure Folder Pro allows users to store their photos, videos and contacts in a discrete, safe folder on their iPhone. The app \u2013 which uses either a dot lock or conventional four digit pin \u2013 even features a decoy duplicate app that can be used to confuse would-be iPhone thieves.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052212\/Screen-Shot-2012-12-11-at-3.21.46-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-825\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052212\/Screen-Shot-2012-12-11-at-3.21.46-PM.png\" alt=\"Dot Lock Protection\" width=\"67\" height=\"67\"><\/a>DOT LOCK PROTECTION<\/strong>: Dot Lock Protection gives iPhone users the ability to create a dot lock unlock pattern, displays a \u201cbreak-in log\u201d showing intruders\u2019 attempts to access their phone and the ability to password protect any image on their phone.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052212\/Screen-Shot-2012-12-11-at-3.24.03-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-826\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052212\/Screen-Shot-2012-12-11-at-3.24.03-PM.png\" alt=\"msecure\" width=\"68\" height=\"68\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/msecure\/id292411902?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">mSECURE<\/a><\/strong>: Boasting over a million users worldwide, mSecure uses 256-bit Blowfish encryption to protect account numbers, usernames and passwords, features a password generator and an \u201coptional self-destruct\u201d feature if a hacker tries to access the phone.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052211\/Screen-Shot-2012-12-11-at-3.25.13-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-827\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052211\/Screen-Shot-2012-12-11-at-3.25.13-PM.png\" alt=\"Silent Phone\" width=\"68\" height=\"66\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/silent-phone\/id554269204?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">SILENT PHONE<\/a><\/strong>: Silent Circle subscribers use the app Silent Phone for secure, encrypted peer-to-peer calling. Created by the founders of PGP (Pretty Good Privacy), Silent Phone utilizes ECDH-384 and AES 256 encryption for secure video and voice conversations.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052211\/Screen-Shot-2012-12-11-at-3.26.33-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-828\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052211\/Screen-Shot-2012-12-11-at-3.26.33-PM.png\" alt=\"secumail\" width=\"70\" height=\"70\"><\/a>SECUMAIL<\/strong>: SecuMail, albeit a bit pricey at $49.99, is a vital iPhone app for privacy advocates who use OpenPGP for corporate email. The app is a partial implementation of the OpenPGP standard, allowing the encryption, decryption, signing and verifying of messages.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052210\/Screen-Shot-2012-12-11-at-3.28.15-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-829\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052210\/Screen-Shot-2012-12-11-at-3.28.15-PM.png\" alt=\"Chatsecure\" width=\"80\" height=\"81\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/chatsecure-encrypted-secure\/id464200063?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">CHATSECURE<\/a><\/strong>: The open source messaging platform ChatSecure is based on the Cypherpunks\u2019 Off-the-record protocol to enable secure conversation over ZMPP\/AIM accounts. On the app\u2019s site, Chris Ballinger, one of the developers says \u00a0the \u201cproject is *100% free* because it is important that all people around the world have unrestricted access to privacy tools.\u201d All conversations are encrypted and the app is compatible with popular chat programs like Adium and Pidgin.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052210\/Screen-Shot-2012-12-11-at-4.04.39-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-831\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052210\/Screen-Shot-2012-12-11-at-4.04.39-PM.png\" alt=\"Ben the Bodyguard\" width=\"67\" height=\"70\"><\/a>BEN THE BODYGUARD<\/strong>: Ben the Bodyguard, produced by Nerd Communications puts a fun spin on the normally stuffy security app. In this case, Ben is a \u201cpersonal guardian for all your most sensitive and secret on-the-go data.\u201d The app uses 256-bit AES encryption along with users\u2019 passwords to hide photos, passwords, reminders and notes. Ben, a sinister looking bodyguard (who also happens to be a dead ringer for Jean Reno\u2019s character in L\u00e9on: The Professional) walks users through password tutorials and explains how to better secure your phone.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052210\/Screen-Shot-2012-12-11-at-4.07.42-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-832\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052210\/Screen-Shot-2012-12-11-at-4.07.42-PM.png\" alt=\"Black SMS\" width=\"71\" height=\"73\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/black-sms-protected-texts\/id448049263?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">BLACK SMS<\/a><\/strong>: Black SM, hides text messages behind a black chat bubble \u2013 obscuring any sensitive information from curious onlookers.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052209\/Screen-Shot-2012-12-11-at-4.08.44-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-833\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052209\/Screen-Shot-2012-12-11-at-4.08.44-PM.png\" alt=\"Kaspersky Deblocker\" width=\"70\" height=\"68\"><\/a>KASPERSKY DEBLOCKER<\/strong>: Kaspersky Lab\u2019s Deblocker can help iPhone users generate unlock codes to remove cybercriminals\u2019 pesky banners from their phone\u2019s desktop.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052209\/Screen-Shot-2012-12-11-at-4.11.43-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-834\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052209\/Screen-Shot-2012-12-11-at-4.11.43-PM.png\" alt=\"Kaspersky\" width=\"70\" height=\"68\"><\/a>KASPERSKY PARENTAL CONTROL<\/strong>: Kaspersky Lab\u2019s SafeBrowser is a free app that filters out inappropriate sites (sites containing pornography, violence, drugs and other adult content) to help children have a more secure online experience while using iOS devices.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052209\/Screen-Shot-2012-12-11-at-4.13.18-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-835\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052209\/Screen-Shot-2012-12-11-at-4.13.18-PM.png\" alt=\"Dashlane\" width=\"75\" height=\"71\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/dashlane\/id517914548?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">DASHLANE<\/a><\/strong>: Dashlane provides online shoppers with \u201ccompletely secure\u201d instant checkouts on their iPhones while a recent update can send users an alert if one of their web accounts has been compromised.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052209\/Screen-Shot-2012-12-11-at-4.14.14-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-836\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052209\/Screen-Shot-2012-12-11-at-4.14.14-PM.png\" alt=\"Mokafive\" width=\"68\" height=\"66\"><\/a>MOKAFIVE<\/strong>: Mokafive allows iPhone users to access to corporate files curated by their business\u2019s IT department. Once accessed, files can be cached locally for use offline in what the company\u2019s developer, Moka5, calls a LiveData container.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052209\/Screen-Shot-2012-12-11-at-4.15.10-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-837\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052209\/Screen-Shot-2012-12-11-at-4.15.10-PM.png\" alt=\"Stash\" width=\"69\" height=\"68\"><\/a>STASH<\/strong>: Stash, which comes in a free and $2.99 deluxe version, allows users to store their own media \u2013 photos, videos and documents privately. A decoy password can be used to lead to a decoy account while the app\u2019s browser features its own private history, bookmark and cookie controls.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052208\/Screen-Shot-2012-12-11-at-4.16.16-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-838\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052208\/Screen-Shot-2012-12-11-at-4.16.16-PM.png\" alt=\"eWallet\" width=\"70\" height=\"69\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/ewallet-password-manager-secure\/id284721352?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">eWALLET<\/a><\/strong>: eWALLET protects users\u2019 passwords, usernames and PINs with 256-bit AES encryption, time out locks and now, optional backups to iCloud.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052208\/Screen-Shot-2012-12-11-at-4.17.08-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-839\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052208\/Screen-Shot-2012-12-11-at-4.17.08-PM.png\" alt=\"iKeepPass\" width=\"69\" height=\"71\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/ikeepass\/id299697688?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">iKEEPASS<\/a><\/strong>: German developer Karsten Fusenig\u2019s iKeePass helps store iPhone users\u2019 databases, app settings, configuration databases and other information. An iOS version of the popular Microsoft software password management utility KeePass, Fusenig likens the app to a \u201ctresor,\u201d or \u201cvault,\u201d in German.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052208\/Screen-Shot-2012-12-11-at-4.21.01-PM.png\"><img decoding=\"async\" class=\"alignnone  wp-image-840\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052208\/Screen-Shot-2012-12-11-at-4.21.01-PM-150x150.png\" alt=\"\" width=\"77\" height=\"77\"><\/a>SNAP<\/strong>: Jason Beatty\u2019s Snap is an acronym for Simple Network Area Prober. Tthe app can quickly scan the network around your phone and let you know what servers, routers and iPhones are nearby. For each device that Snap finds, you can also scan it for common services such as HTTP, remote login, AppleTalk, Microsoft networking, and many others.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052207\/Screen-Shot-2012-12-11-at-4.23.36-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-841\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052207\/Screen-Shot-2012-12-11-at-4.23.36-PM.png\" alt=\"Lastpass\" width=\"68\" height=\"66\"><\/a><a href=\"https:\/\/itunes.apple.com\/us\/app\/lastpass-for-premium-customers\/id324613447?mt=8\" target=\"_blank\" rel=\"noopener nofollow\">LASTPASS<\/a><\/strong>: LastPass, the popular password manager has a few iPhone apps. One, a premium version, offers all the functions a normal LastPass Premium service would offer. Users can log into their accounts en masse so the usernames and passwords are \u201cseamlessly synced\u201d to a users\u2019 iPhone from a Windows\/Mac\/Linux machine via a Host Proof Hosting method.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052207\/Screen-Shot-2012-12-11-at-4.24.27-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-842\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052207\/Screen-Shot-2012-12-11-at-4.24.27-PM.png\" alt=\"Last Pass Wallet\" width=\"66\" height=\"67\"><\/a>LASTPASS WALLET<\/strong>: A second LastPass app, LastPass Wallet acts a lot like a wallet \u2013 the app stores notes on users\u2019 credit cards, PINs, along with photos and audio clips. An account can be set up independently or through a user\u2019s existing LastPass account while their information is secured by secure cloud storage and local-only encryption and decryption via a PIN code prompt.<\/li>\n<li><strong><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052207\/Screen-Shot-2012-12-11-at-4.26.12-PM.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-843\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2012\/12\/06052207\/Screen-Shot-2012-12-11-at-4.26.12-PM.png\" alt=\"Safe Eyes Mobile\" width=\"69\" height=\"70\"><\/a>SAFE EYES MOBILE<\/strong>: Safe Eyes Mobile, distributed by InternetSafety.com, deploys a safe online environment for children by subbing out Safari for a browser that filters certain types of content and syncing across PC, Mac and iOS.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Apple popularized the app-store concept and the iPhone and its companion store have gained a reputation for security over the years. While iOS on its own is quite secure, there<\/p>\n","protected":false},"author":32,"featured_media":736,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[109,26,97],"class_list":{"0":"post-721","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-apps","9":"tag-iphone","10":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/must-have-iphone-security-apps\/721\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/must-have-iphone-security-apps\/721\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/must-have-iphone-security-apps\/721\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/must-have-iphone-security-apps\/721\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/must-have-iphone-security-apps\/721\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/must-have-iphone-security-apps\/403\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/must-have-iphone-security-apps\/721\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/must-have-iphone-security-apps\/721\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apps\/","name":"apps"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=721"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/721\/revisions"}],"predecessor-version":[{"id":31226,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/721\/revisions\/31226"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/736"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}