When Apple first released iOS 6.1 and I’ve seen too many users complaining about a lot of problems that needs a quick fix from Apple, but today I have got another bug that can make anyone bypass your iPhone lock-screen so I hope Apple find a quickly fix for this bug…

The trick that allows you to bypass the lockscreen was first discovered in in iOS 2.0 – and that was way back in July of 2008. And now, in addition to a simple passcode bypass trick a YouTube user detailed on Valentine’s Day, another method of circumventing the Lock screen passcode has been discovered and highlighted in a video below…


Antivirus maker Kaspersky wrote in a threat post:

Similar to the iPhone’s passcode vulnerability, the exploit involves manipulating the phone’s screenshot function, its emergency call function and its power button.
Users can make an emergency call (911 for example) on the phone and then cancel it while toggling the power on and off to get temporary access to the phone.

Jacqui Cheng of Ars Technica explains the exploit, which was discovered and detailed on February 18 by Vulnerability Lab CEO Benjamin Kunz Mejri:

The difference between the first exploit and this one is how it can make the iPhone screen go black, allowing an attacker to plug the device into a computer via USB and access the user’s data without having their PIN or passcode credentials.

And like the first exploit, this one lets a malicious user bypass a passcode on the Lock screen and gain access to your messages, phone calls, contacts and other private data.

You can reproduce the glitch using the following steps:

• make sure a passcode is activated in Settings and then lock your device by pressing the Sleep/Wake button
• hit the Sleep/Wake button again to wake up the device
• slide to unlock
• tap the Emergency Call button on a virtual keypad
• dial 911, 110, 112 or any other emergency call number from a public listing and immediately hang up the call
• hit the Sleep/Wake button to send the device to sleep, then wake it up and slide to unlock
• hold the Sleep/Wake button pressed for three seconds and then just before the ‘slide to power off’ prompt appears tap the Emergency Call button

So as long as you are holding both Wake/Sleep button, you will be able to gain access to your contacts, call list, apps and more, but don’t think that you will be able to get into messages, photos and other big things.

Kaspersky’s security advisory notes that connecting a compromised device to a computer via a USB cord exposes not only the user’s photos, contacts and other PIM data because more “will be available directly from the device hard drive without the pin to access.”

So we hope Apple fix this problem as fast as possible before the exploit become more dangerous..

CONTACT US

We're not around right now. But you can send us an email and we'll get back to you, asap.

Sending

Log in with your credentials

Forgot your details?