Feeds

Apple updates iOS, does not fix passcode-bypass hack

Version 6.1.2 should fix battery-draining Exchange bug, however

Choosing a cloud hosting partner with confidence

Apple released iOS 6.1.2 on Tuesday, an update that it says will fix the battery-draining Exchange bug — which it very well may do – but the update does not fix the finger-dancing hack that allows you to bypass an iPhone's passcode, launch the Phone app, and access all of its contacts, phone-history information, and the like.

Apple had said that a fix for the passcode-avoiding hack was in the works, and so we were understandably curious as to whether the Tuesday's 6.1.2 update would do the trick, even though Apple didn't mention that fix in its description of the update's contents:

Wel, you can't fault Apple for overstating the iOS 6.1.2 update's capabilities

After installing the petite 12.8MB update onto our iPhone 5 after accessing it at Settings > General > Software Update, we crossed our fingers and tried the passcode-bypass finger dance as outlined in the video by Jailbreak Nation that surfaced last week.

Nope. Not fixed. The Phone app and all its contents and capabilities – such as running up the owner's phone bill, emailing contact info, sending text messages, accessing voicemails, et cetera – are still accessible on any passcode-locked iPhone you might get your hands on. Not that any Reg reader would ever think of invading someone's privacy, of course.

We're unable to test whether the 6.1.2 update does, indeed, solve the Exchange over-polling bug that drained users' iPhone batteries — but if you, dear reader, can verify or refute that improvement, we'd love to know in Comments, below.

The iOS 6.1.2 update, by the way, is available for any iDevice that can run iOS 6.X, meaning the iPhone 3GS and later, the iPad 2 and later (including the iPad mini), and the fourth-generation iPod touch and later. ®

Internet Security Threat Report 2014

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Tim Cook: The classic iPod HAD to DIE, and this is WHY
Apple, er, couldn’t get the parts for HDD models
Apple spent just ONE DOLLAR beefing up the latest iPad Air 2
New iPads look a lot like the old one. There's a reason for that
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.