Feeds

iOS bug unlocks iPhones sans password

Making calls from locked iPhone 4s

Intelligent flash storage arrays

A recently discovered bug in Apple's iOS 4.1 allows users to make iPhone calls without first entering a passcode.

The bug means there is no way to prevent unauthorized people from using the devices in the event they're lost or stolen. All that's required to unlock a phone is to press the Emergency Call button, enter a non-emergency number such as ###, tap the call button and immediately hit the lock button. Voila, the iPhone's contacts page will open, from which calls can be made.

Like most smartphones, the iPhone comes with a lock that requires a user to enter a password before calls and other features can be used. The ability to bypass the protection was reported on Friday by a MacForums user. Other members quickly confirmed it worked on iPhones running iOS 4.1 and that the technique also allowed unauthorized users to active the device's voice control mode.

You can test it for yourself, or view the video below to see it in action.

It's not the first time the iPhone passwords have been tripped up by a flaw involving the Emergency Call button. The Register was surprised to find just such a bug in August 2008. The embarrassing goof was quickly fixed, and we thought that would be the end of it. Now – for a limited time, anyway – it's back. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.