Skip to main content

Another iPhone Lock Screen Bypass Trick Emerges

Apple just this week released a fix for the highly publicized lock screen bypass that was discovered in mid-February. Unfortunately, it seems another trick that allows similar access to the device has already been discovered.

According to The Next Web, this vulnerability is present in iOS 6.1.3. This version was just released earlier this week and contained a number of bug fixes along with a fix for the lock screen bypass. The method for bypassing the lock screen in that instance was pretty complicated. This time, it's much, much easier.

Before, bypassing the lock screen involved a complicated series of taps, interrupted emergency calls, and attempting to the turn the phone off. This time, all you need is for voice dialing to be enabled and to pull out the SIM card mid-call. This brings up the dialer and from there you can access photos, call history, and more.

Apple hasn't commented on this new hole but we'll keep you posted. For now, you can protect your phone by switching off voice dial in the passcode lock section in the Settings menu.

Contact Us for News Tips, Corrections and Feedback

  • leo2kp
    Who needs viruses when they create back doors for you?
    Reply
  • blurr91
    Yet another "undocumented feature."
    Reply
  • house70
    I said it before, Apple's farts stink like everyone else's.
    Man, do I hate it when I'm right...
    Or, do I?....
    Reply
  • nebun
    ok....enough with the bashing....first, someone needs to put their dirty little hands on my phone in order to exploit it....that's not going to happen any time soon.
    Reply
  • infamouswoodster
    @House70

    It's not a "fart" it's perfume , You are just Smelling it wrong...
    Reply
  • Pinhedd
    Holy shit, Windows 98 was more secure than that.
    Reply
  • freggo
    nebunok....enough with the bashing....first, someone needs to put their dirty little hands on my phone in order to exploit it....that's not going to happen any time soon.
    Famous last words... :-)
    Reply
  • curnel_D
    nebunok....enough with the bashing....first, someone needs to put their dirty little hands on my phone in order to exploit it....that's not going to happen any time soon.You don't understand the implications. For instance, if you were to ever be arrested, you can be absolutely certain that your phone will have had attempts to bypass your passcode and/or recovering your personal data from it. Same can be said for TSA checkpoint, or realistically any time that it's a pain in the ass for someone to call a judge up and ask for a quick warrant on the spot. (Which rarely happens)

    What happens when they find something on your phone? Well, you might think it nullifies that evidence, and you'd be correct. But what it doesn't do is remove their ability to detain you for probable cause (PC), which can last long enough for a more in-depth warrant. If they find anything suspicious on your phone, whether it's incriminating or not, you suddenly fall within PC in most states, just because your phone as a glaring security flaw.
    Reply
  • jackbling
    curnel_DYou don't understand the implications. For instance, if you were to ever be arrested, you can be absolutely certain that your phone will have had attempts to bypass your passcode and/or recovering your personal data from it. Same can be said for TSA checkpoint, or realistically any time that it's a pain in the ass for someone to call a judge up and ask for a quick warrant on the spot. (Which rarely happens)What happens when they find something on your phone? Well, you might think it nullifies that evidence, and you'd be correct. But what it doesn't do is remove their ability to detain you for probable cause (PC), which can last long enough for a more in-depth warrant. If they find anything suspicious on your phone, whether it's incriminating or not, you suddenly fall within PC in most states, just because your phone as a glaring security flaw.
    Another scary situation is as it pertains to enterprise, or PHI; a fully encrypted device should not have this easy a bypass.

    When touting security as a selling point, you cannot afford to lose customer confidence.
    Reply
  • blazorthon
    PinheddHoly shit, Windows 98 was more secure than that.
    Have you ever heard of Konboot?
    Reply