Friday, 7 August 2015

Another IPhone Lockscreen Bypass Vulnerability Found In IOS 7.02

Another iPhone lockscreen bypass vulnerability found on latest iOS 7.02

Here we go again! Earlier this week, Apple released iOS 7.0.2 just to fix some Lockscreen bugs in iOS 7 and but a researcher has found a new Lockscreen bug in new iOS 7.0.2.

This new Lockscreen bug is found by Dany Lisiansky, and he uploaded a proof of concept video on YouTube with the complete step by step guide.
Unlike the previous bugs it will not expose your Email, Photos, Facebook and Twitter but allows attackers to access your phone call history, voicemails and entire list of contacts.

A step by step guide released by iDownloadblog:
  1. Make a phone call (with Siri / Voice Control)
  2. Click the FaceTime button
  3. When the FaceTime App appears, click the Sleep button
  4. Unlock the iPhone
  5. Answer and End the FaceTime call at the other end
  6. Wait a few seconds
  7. Done. You are now in the phone apphttp://www.youtube.com/watch?v=fVpfdYYy1Dg
It would be easy for someone who knows you or your love partner or your business partner to obtain your phone and call themselves from it to take advantage of this trick and they may only gain access to the Phone app.
Another iPhone lockscreen bypass vulnerability found on latest iOS 7.02
Fixing this bug is pretty simple, Disable the Siri in Lockscreen by navigating to “Settings –> General –> Passcode –> Siri” and disable it there.

Also read that how an Iranian group defeated the iPhone Fingerprinting scanner Touch ID again, which allows them to unlock an iPhone device with multiple Fingerprints.

No comments:

Post a Comment

Top 5 ways to use trial software forever

Top 5 ways to use trial software forever Trial version software mostly comes with one month or a few days trial period and will expire af...