Apple addresses lockscreen bypass bug with iOS 7.0.2 rollout

Apple confirmed and assured everyone that it was working on a fix to the iOS 7 lockscreen bypass bug last week that let sneaky individuals mess with users’ email and social network accounts. And now, exactly seven days later, said update is hitting handsets in the form of iOS 7.0.2. Directly to the point, the update is said to “fi[x] bugs that could allow someone to bypass the lock screen passcode.” And hey, there’s also a Greek keyboard option for passcodes thrown into the update for good measure.

Filed under: , , ,

Comments

Via: 9 to 5 Mac

Anyone Can Bypass Your iOS 7 Lockscreen and Make Calls With Your Phone

Just the other day we came across an iOS 7 vulnerability that will let creeps see your photos and even share them from behind the lockscreen. But that’s not all! Turns out you can make calls from behind the lockscreen too.

Read more…


    



iOS 7 bug lets you call any number from a locked homescreen (video)

DNP iOS 7 buuuugs

You can expect three things every time a new iOS version comes along: fresh aesthetics, features and, by the looks of it, ways to bypass a locked screen. In iOS 7’s case, this is the second security flaw unearthed since it’s launched: An iPhone user named Karam Daoud recently discovered that you can dial any number on the Emergency call page from a locked homescreen. If you press the green phone button repeatedly after keying in a number, the screen turns black with an Apple logo, and the call goes through. We’ve tested it out on different devices, and while it doesn’t work all the time, the point is that it sometimes does. There’s no apparent way to disable Emergency calls, but Apple reportedly told Daoud it’ll issue a patch later. We’ve reached out to Cupertino for a statement, and we’ll inform you once we hear back.

Meanwhile, if you’ve been hearing about another supposed iOS 7 exploit that allows Siri to make calls, send text messages and post to social networks from a locked screen, don’t worry too much. It’s not actually a bug — just go to Settings > General > Passcode Lock > Allow access when locked, then switch Siri off. After you do that, no mischievous sibling should be able to post embarrassing status updates on your Facebook account. That is, unless you do it yourself after a night of drunken revelry.

Filed under: , ,

Comments

Source: Forbes, BetaNews

Anyone Can Bypass Your iOS 7 Lockscreen to See (and Share!) Your Photos

Got fancy new iOS 7 on that iPhone of yours? Beware. There’s a super simple bug that can let anyone blow right by your lockscreen and look through your pictures, and even share them.

Read more…


    



iOS 7 Is Secretly Baby-Proof

Regardless of what you think of its icons, iOS 7 is a big design shift for Apple, and it’s here to stay. When the new OS finally hits consumer phones everywhere, it might be a little surprise for some, but there’s one demographic it’s really going to flummox: babies.

Read more…

    

Viber exploit lets attackers bypass Android lock screens, for now (video)

Viber exploit lets users bypass Android lock screens, a fix is on the way video

If you’re an Android user who prefers Viber for VoIP and messaging, you may not want to leave your phone unattended in the near future. Bkav Internet Security has discovered an exploit that will bypass the lock screen on Android phones new and old (including the Nexus 4) as long as pop-up notifications are active. While the exact actions vary from phone to phone, all that’s really needed is an incoming message or two, a handful of taps and the back button to reach the home screen. App users can disable the pop-ups as a short-term workaround, although they thankfully won’t have to do that for long when Viber promises that a patch is on the way. There’s only a small chance that a malicious attacker will both get their mitts on your phone and know that you’ve got Viber installed, but we’d advise against using statistical probability as a security measure.

Filed under: ,

Comments

Via: Ars Technica

Source: Bkav

Mobile Miscellany: week of March 25th, 2013

Mobile Miscellany week of March 25th, 2013

If you didn’t get enough mobile news during the week, not to worry, because we’ve opened the firehose for the truly hardcore. This week, an unknown T-Mobile handset with Snapdragon 800 internals lit up the benchmarks, Sony was foiled at the lock screen and Rogers made 44 new promises without saying much at all. These stories and more await after the break. So buy the ticket and take the ride as we explore all that’s happening in the mobile world for this week of March 25th, 2013.

Filed under: , , ,

Comments

Samsung’s Android phones affected by another lockscreen bypass, fix is in the works

Since lockscreen bypass methods are apparently what’s hot in the streets, it’s no surprise that yet another one has surfaced, this time targeting Samsung’s Android phones. A variant of another, earlier uncovered method, this one does not fully unlock the phone by itself, but does provide access to apps and settings for a brief period. Given that, as demonstrated in the video by Terence Eden, it’s possible to use Google Play to download an app to disable the locked screen and fully access the phone.

According to Terence, this problem is confirmed on the Galaxy Note II, possibly the Galaxy S III and potentially on other TouchWiz UI Samsung Android phones. Disabling screen animations under developer options should reduce the vulnerability, but doesn’t eliminate it without switching to another ROM. He also mentions Samsung is aware of the issue and is working on a fix, but that leaves phones accessible right now. We’ve certainly seen enough of these recently (Apple’s latest version of iOS has also been victimized again in the last day) to know leaving our phones out, locked or unlocked, is foolish. At the same time, if a manufacturer insists on adding customized software to the existing platform, it could at least have the courtesy to do so without causing security leaks — check after the break for a “bonus” vid sent in by another tipster that shows a way to activate voice commands on a locked Galaxy S II.

Filed under: , , ,

Comments

Via: Rootzwiki

Source: Terence Eden Has A Blog

iOS 6.1.3 screen lock bypass uncovered (video)

Remember how yesterday’s release of iOS 6.1.3 was supposed to fix a security hole that allowed one to bypass the lock screen? Well, turns out Apple’s got a bit more work to do. Today, a new lock screen sidestep was revealed by YouTube user VideosdeBarraquito, and this time around, running iOS 6.1.3 won’t do you any good. The bypass involves invoking a telephone call by voice command and then ejecting the SIM card at a specific event. After a few steps, access to a users contact list and photo gallery becomes easily accessible. The upside? If you’re genuinely concerned about your security, you can plug this hole yourself by disabling the voice dial option from the Password Lock screen within system settings. You can view the complete exploit after the break. As for Apple, looks like it’s back to the drawing board.

Filed under: , ,

Comments

Via: AllThingsD

Source: videosdebarraquito (YouTube)

Google My Tracks update brings Drive integration and a lock screen widget

Google gives My Tracks athletes Drive integration and a lock screen widget

Cyclists and runners with Android phones have had a rare first-party option for keeping tabs on their performance through Google’s My Tracks, but the app hasn’t been entirely in step with those who upgrade their OS as quickly as they barrel down the street. It’s back on pace with a quiet update: My Tracks now has a customizable lock screen widget for Android 4.2 users who want to know their distance or speed details at a glance. Whether or not you’re running the latest and greatest Android version, the upgrade will sync finished tracks with Google Drive for safekeeping and sharing; extra-competitive types can also import KML files and view others’ tracks for comparisons. Hit the source link if time (or simple oneupmanship) is of the essence.

Filed under: , ,

Comments

Via: Android Police

Source: Google Play