YET ANOTHER lock screen flaw has been discovered in Apple's iOS 7 mobile operating system, granting hackers access to users' personal details in "less than five seconds".
Youtube user EverythingApplePro posted a video detailing the glitch on Monday, which allows anyone to bypass Apple's passcode and Touch ID security methods to gain unauthorised access to an iPhone - and any application that was opened in the foreground - within less than five seconds.
EverythingApplePro, which we assume isn't his or her real name, said, "NEW METHOD How To Bypass ANY Passcode In 5 SECONDS On iPhone 5S, 5C, 5, 4S & 4 On 7.1.1, 7.1.2, 7.1 & Below. Full access into Applications, NOT just the phone app. In total (In case you were wondering) I spent about 2 hours finding this bypass."
The flaw bypasses Apple's default security methods completely, but in order for the trick to work, the phone must have a missed call in the Notification Center. If there is a missed call, a hacker only needs wake the device, pull up the Control Center and enable airplane mode, then pull down the Notification Center and tap the missed call.
While this doesn't grant a hacker access to all of an iPhone users personal details and applications, the glitch does allow access to any apps that were open before the handset was locked. So, if you were using the Amazon app before locking your phone, your personal and financial details are up for grabs.
Apple has yet to acknowledge the flaw, but likely will patch it in a future iOS release.
This isn't the first time that lock screen security on iOS has been compromised. Last year, just 72 hours after the release of iOS 7, a glitch was uncovered that offered hackers access to an iPhone via its newly-added Control Center. Most recently, a lock screen glitch was discovered in iOS 7.1.1 that allowed easy bypassing of the lock screen simply by activating Siri. µ
Is this a banana I see before me, etc
Bad news for developers, good news for SoundCloud
Windows 10 Pro users kicked in the craw again
It might feature a 3.5mm headphone jack, after all