You are here
Home > Entertainment > iOS 6.1 hack lets users see your phone app, place calls

iOS 6.1 hack lets users see your phone app, place calls

20130217-155429.jpg

Some sleight of hand will allow iOS 6.1 hackers to access your phone application, listen to your voice mails, and place calls.
A YouTube video showing users how to “bypass iPhone 5 passcode” on Apple’s latest iOS releases, including iOS 6.1, has been published. The person who uploaded the video shows how anyone can access the phone application on a passcode-protected iPhone.
In order to achieve the hack, users must come close to turning off the iPhone, place an emergency call, and keep their finger on the power button. CNET was able to recreate the hack with ease, and the YouTube user who uploaded the video provided step-by-step directions.
“For prank[ing] your friends, for a magic show. Use it as you want, at your own risk, but…please…do not use this trick to do evil,” “videosdebarraquito” posted on the YouTube page.
The video was actually published at the end of last month. However, it flew under the radar until The Verge discovered it earlier today.
Although the video and directions show how to sidestep Apple’s simple passcode that allows users to input four numbers to unlock the device, CNET was able to conduct the same hack on Apple’s more sophisticated passcode option that lets users input text.
Upon breaking into a device, users have the ability to listen to voice mails, place calls, and look through the handset’s photos through the contacts section of the phone app. When trying to go elsewhere in the software, the user is sent back to the passcode screen. Still, there doesn’t currently appear to be any immediate way to safeguard against the hack.
CNET has contacted Apple for comment on the hack. We will update this story when we have more information.

Please FOLLOW, LIKE, and SHARE us:
112301
KINGSMEN the BLOGGER
'KINGSMEN' -Atlanta's Photographer|Videographer|Blogger|Editor
http://KingsmenMEDIA.COM

Leave a Reply

Top
%d bloggers like this: