Feeds

Apple updates iOS, does not fix passcode-bypass hack

Version 6.1.2 should fix battery-draining Exchange bug, however

The Power of One Brief: Top reasons to choose HP BladeSystem

Apple released iOS 6.1.2 on Tuesday, an update that it says will fix the battery-draining Exchange bug — which it very well may do – but the update does not fix the finger-dancing hack that allows you to bypass an iPhone's passcode, launch the Phone app, and access all of its contacts, phone-history information, and the like.

Apple had said that a fix for the passcode-avoiding hack was in the works, and so we were understandably curious as to whether the Tuesday's 6.1.2 update would do the trick, even though Apple didn't mention that fix in its description of the update's contents:

Wel, you can't fault Apple for overstating the iOS 6.1.2 update's capabilities

After installing the petite 12.8MB update onto our iPhone 5 after accessing it at Settings > General > Software Update, we crossed our fingers and tried the passcode-bypass finger dance as outlined in the video by Jailbreak Nation that surfaced last week.

Nope. Not fixed. The Phone app and all its contents and capabilities – such as running up the owner's phone bill, emailing contact info, sending text messages, accessing voicemails, et cetera – are still accessible on any passcode-locked iPhone you might get your hands on. Not that any Reg reader would ever think of invading someone's privacy, of course.

We're unable to test whether the 6.1.2 update does, indeed, solve the Exchange over-polling bug that drained users' iPhone batteries — but if you, dear reader, can verify or refute that improvement, we'd love to know in Comments, below.

The iOS 6.1.2 update, by the way, is available for any iDevice that can run iOS 6.X, meaning the iPhone 3GS and later, the iPad 2 and later (including the iPad mini), and the fourth-generation iPod touch and later. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.