THE FIRST significant security risk has been discovered in Apple s iOS 7, just 72 hours after release.
The bug occurs because, by default, the Control Centre functionality is set to be available even when the screen is locked. Although full access is not possible, a thief could take control of the camera including the photo reel and post to linked social networks.
Although the bug only manifests if a very precisely timed sequence of key presses is performed, the fact that this information is now in the public domain means that a patch will be required quickly. In the meantime, users can disable the feature, and the associated security risk, by simply disabling the option for Control Centre in their lockscreen.
Mobile security firm Lookout has revealed that it has managed to use the bug to access the timer, calculator and contacts list, though we can't imagine the first two being any huge threat to personal data.
Whilst acknowledging that concern is warranted in the ongoing battle to keep personal information private, we should emphasise that this is a somewhat convoluted security risk, relying as it does on a number of criteria being met.
We do wonder, however, whether Samsung will perhaps want to claim a patent on this lockscreen bug, given that its Android phones were similarly afflicted earlier this year.
Meanwhile, in a separate development, venture capitalist IO Capital has put a bounty of $10,000 for the first hacker who can "reliably and repeatedly" break into an iPhone 5S by lifting fingerprints. Since the prize was announced, the hacking community has been adding its own prizes, including copious amounts of alcohol and bitcoins. µ
Unfortunately, it's led by TalkTalk
Google's bug hunter strikes again
But Article 29 Working Party still has concerns
Apple's next smartphone could, but probably won't, arrive as the iPhone 6SE