Feature Article

March 21, 2013

Apple iOS 6.1.3 Sets Out to Fix Bug, Encounters Another Lock Screen Flaw

As technology continues to get more advanced, so do the capabilities of hackers and cyber criminals. Only a month ago, an iOS software update, 6.1.2, set out to fix a bug related to Microsoft Exchange. The bug caused unusually high power consumption and network cycling, draining the battery at a much more rapid pace than should be. Then, a security bug was discovered that allowed anyone to bypass a password-enabled security lock screen on an iPhone in just a few steps.

Apple has just released an update this week, iOS 6.1.3, that fixes this lock screen bug, brings improvements to the Maps app specific to Japan and contains additional security improvements and bug fixes.

However, a similar vulnerability has been discovered that still allows users to hack into an iPhone. According to The Next Web, the bug appears to only be for an iPhone 4 or 4S, however iPhoneblog.de have apparently had luck in making it work on an iPhone 5.

 The bypass bug appears to be linked to the pre-Siri Voice Dial system, so users can prevent the issue entirely by disabling voice dialing in the Settings>General>Passcode screen or just leaving Siri enabled, because it hasn’t been able to work when more modern voice control systems are up and running.

The latest bug appears to only give access to photos and contacts and requires physical access to the device.

A similar vulnerability was also found on some Samsung phones that allows complete access to a device. The bug can allow users to bypass the lock screen entirely through the use of third-party apps, affecting pattern unlocks, PIN code screens and face detection security.




Edited by Ashley Caputo


comments powered by Disqus

FOLLOW MobilityTechzone

Subscribe to MobilityTechzone eNews

MobilityTechzone eNews delivers the latest news impacting technology in the Wireless industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter