What to do if your Apple product
has been stolen?

STEP 1

Alert your
emergency
contact

Criminals might reach out to your emergency contacts via SMS about your missing device being found, advise them to not respond to a message asking to reset any credentials on your device or to provide any information to your account.

STEP 2

When you lose your phone, Apple gives you these options:

Enabling Lost Mode in iCloud will lock your device, protecting your data and having your phone still traceable while turned on.

Erasing your device can't be undone but if your device has iOS 15 or later, or iPadOS 15 or later, you can still use Find My iCloud.com/find to locate it after you erase it. You will need to also remove your device from your account as a trusted device.

Click here to read the full instructions on how to use Lost Mode.

STEP 3

Contact your network provider

Next contact your network provider to blacklist your lost or stolen device. The network provider will give you the ITC number. You will need to provide them with the following information to have your device blacklisted.

ITC is needed for the police and insurance report.

  • ID number
  • Cellphone number
  • IMEI number
  • Physical address
  • Answers to your security questions

STEP 4

Report the loss of your Apple product to the SAPS

You need to go to your nearest police station to report the incident. Provide the ITC number and report your lost or stolen device. A case number will be given to you which is important for insurance claims.

STEP 5

Report the loss of your Apple product to your insurance company

Contact your insurance provider (usually within 30 days of the incident) and proceed with a claim. In most cases, you will be expected to provide the following information:

  • ID number
  • Cellphone number
  • IMEI number
  • Physical address
  • Answers to your security questions

Types of Scams

  • Email Scams

    How to recognise a fraudulent email:

    1. Apple will never ask you to provide personal or sensitive information via email e.g. passwords or credit card numbers.
    2. The sender’s email address does not match that of the company it is claiming to be.
    3. Although the link provided may seem to be legitimate, when you click on it, it takes you to a website that does not match the company that it says it is.
    4. The http of the website link that you click on is not secure. It should have a ’s’ in the URL, for example, https://www.companyname.com.
    5. The email begins with a generic greeting, most companies will address you by name.
    6. The email looks different from other emails that you have received from the same company previously.

    How to avoid email scams:

    1. Never click on a link unless you can verify the sender.
    2. Do not open or save attachments from an unknown sender.
    3. Use a strong password for your Apple ID and always keep this information secure and up to date. 
    4. Use two-factor authentication. This means that your Apple ID can only be accessed on devices that you trust (such as your iPad, Mac and iPhone). If you log into another device for the first time you will be asked to provide your Apple ID password as well as a verification code that appears on one of your trusted devices.
  • SMS Scams

    How to recognise a fraudulent SMS:

    1. You receive a text message, that appears official, references the specific model of your stolen iPhone.
    2. The message prompts you to click on a link to verify and sign in with your Apple ID.
    3. It takes you to a page that looks very much like Apple’s page. The only way that you can recognise that it is, in fact, a fake is to scrutinise the URL. You will notice that it is different to an Apple URL, even though it appears to be secure (https://)
    4. This confidential account information will now get sent to the scammers who as a result have access to your Apple ID account.

    How to avoid SMS scams:

    1. Double-check unfamiliar numbers or messages. Legitimate organisations often use recognisable sender IDs.
    2. Refrain from clicking on links in unexpected texts. Hover over links to preview URLs, and only open them if certain of their legitimacy.
    3. Never disclose sensitive information like passwords or financial details via SMS. Legitimate entities won't request such data through text messages.
    4. Block suspicious numbers and report them to your mobile carrier. This helps prevent further scam attempts.
  • Fake iPhone Scams

    How to recognise a fake iPhone:

    1. It is lighter than a regular iPhone.
    2. The font appears different to that of the font on a genuine iPhone.
    3. The operating system is Android, not iOS.
    4. The App Store looks different, but you will notice that it does have iCloud options.
    5. The Touch ID does not work properly, it is often just an ordinary button.
    6. The screen is not as clear, it appears to be more pixelated.
    7. Siri only works on a genuine iPhone.

    How to avoid fake iPhone scams:

    1. Physically inspect the iPhone.
    2. Ask the dealer if you can take it to a technician of your choice to inspect the iPhone.
    3. The seller may provide you with a proof of purchase for the device. Take special note of the details on the invoice, how it is laid out and what information is included.
    4. Contact the store to check if the invoice is legitimate and whether the device was in fact purchased from the store.
    5. Remain wary of purchasing any items online until you have inspected the device or done all the necessary checks.
  • Gift Card & iTunes Card Scams

    How to recognise a Gift card and iTunes card scams:

    1. You will receive a call from someone requesting that they make an urgent payment by purchasing an iTunes Gift Card from their nearest retailer.
    2. You will be asked to share the 16-digit code on the back of the card with the caller.

    How to avoid a Gift card and iTunes card scams:

    1. Remember that you can only use your iTunes Gift Card to purchase goods and services on the iTunes Store, App Store, iBooks Store, or for an Apple Music membership. If asked to purchase anything other than these, you are most likely being targeted by a scam.
    2. Never provide the numbers on the back of your iTunes Gift Card to someone you do not know.
  • Access to iCloud details through ‘verify’ your account communication

    How to recognise iCloud scams:

    1. Be wary of unsolicited emails or messages claiming to be from Apple or iCloud. Legitimate communications are typically initiated by the user.
    2. Legitimate communications from Apple usually address you by your full name. Be suspicious of generic greetings like "Dear Customer" or "Dear User.”
    3. If you receive an unexpected email about a password reset for your Apple ID, verify its authenticity before taking any action.

    How to avoid iCloud scams:

    1. Create strong, unique passwords for your Apple ID. Avoid using easily guessable information and consider using a reliable password manager.
    2. Instead of clicking on links in emails or messages, go directly to the official Apple website by typing the URL into your browser.
    3. Verify the legitimacy of the sender's email address. Scammers often use email addresses that resemble official ones but with slight variations.

Ways to protect your accounts

Enable Stolen
Device Protection
on your iPhone

The new security feature for iPhones requires Face ID or Touch ID for certain actions, and puts a time delay on changing your device passcode or Apple ID password. Go to Settings, then tap Face ID & Passcode. Enter your device passcode. Tap to turn Stolen Device Protection on or off. Within the first hour of your phone being stolen, update passwords on any critical accounts.

Use Strong,
Unique
Passwords

Create strong passwords with a mix of uppercase and lowercase letters, numbers, and symbols. Avoid using easily guessable information such as birthdays or common words. Use a different password for each account or where possible, use hide my email.

Multi Factor
Authentication

Avoid multi-factor authentication via OTP and SMS. Use PassKey where possible.

Use a Password
Manager
like
Keychain

Consider using a reputable password manager to generate, store, and manage complex passwords. Password managers enhance security and make it easier to maintain unique credentials for each account.

Make use of
complex passwords
or phrases

Use different email addresses and passwords for accounts online. Change your passwords regularly, especially if you suspect any security compromise. Update passwords for critical accounts, including email, banking, and social media.

Review Account
Activity

Periodically review the activity on your accounts, especially for services that offer account activity logs. If you notice any unauthorised access, take immediate action to secure your account. Scrutinise emails received from any service you are subscribed to - especially where urgent action is requested.

Don’t use
public
Wi-Fi

Make use of the hotspot feature on your phone.

Exclusions and Limitation of our Liability for Stolen Device Advice Service

This page is designed to provide you with immediate steps you can take in the event your device is lost or stolen, such as contacting your bank, using device tracking, blocking services, and notifying your service provider.

Please Read Carefully:

  1. No Liability upon us for Actions Taken: The advice and steps provided through this service are suggestions based on general best practices. We do not guarantee the security of your device or personal information after following this advice. You acknowledge that all actions you take as a result of this advice are your sole responsibility. iStore accepts no liability for any loss or damage arising directly or indirectly from actions taken based on the information provided by this service or iStore’ s failure to provide any advice or any other omission of iStore.
  2. No Professional Advice: The information offered by this service does not constitute professional, legal or security advice. It should not be used as the sole basis for any decision or action regarding the security of your device or personal information. We strongly recommend consulting with a professional if you require specialised advice tailored to your situation.
  3. Changes and Accuracy: While we strive to provide timely and accurate information, iStore reserves the right to make changes to this service without notice. We cannot guarantee the completeness or accuracy of the information provided and accept no responsibility for errors or omissions.
  4. Use at Your Own Risk: Your use of this service and any information provided is entirely at your own risk. iStore does not accept liability for any special, direct, indirect, incidental, consequential, or punitive damages arising out of your access to, use of, or inability to use this service, or any errors or omissions in the content of this service.
  5. By using this service, you acknowledge that you have read, understood, and agree to be bound by this disclaimer. If you do not agree with any part of this disclaimer, please refrain from this service.