Categories: News

iPhone security flaw lets you bypass lock screen to access Phone app

A major security vulnerability allows potentially anyone to bypass the iPhone passcode lock screen and get full access to the Phone app including call records, contacts and even share the contacts via email or MMS.

What’s alarming about this security flaw is how easy it is to execute. All you need to do is, from the passcode lock screen, make an “emergency call” and dial any number, press “call” and then then quickly press the power button on top of the iPhone. Immediately you’ll have full access to the Phone app along with all the information contained within it.

So iPhone users out there, don’t think that your phone is safe even with the passcode lock enabled. lock

Head on over to after the jump for a video that shows you how to bypass the passcode lock screen.

[source, via]
[picture credit]

Recent Posts

Honor X9c 5G Malaysia: More durable than ever before, priced from RM1,499

Honor has officially launched the Honor X9c 5G here in Malaysia. Despite featuring similar internals…

2 hours ago

Xiaomi’s first clamshell foldable smartphone redefines style in a compact yet powerful form

This post is brought to you by Xiaomi. Combining cutting-edge technology with a sleek, foldable…

3 hours ago

GXBank to rollout GX FlexiCredit this month, GX Biz Banking for MSME coming soon

During its GX 2.0 event, GXBank revealed its new digital financial products aimed at helping…

4 hours ago

GX 2.0: GXBank continues to offer unlimited cashback with some tweaks

GXBank turns one and they have revealed its latest features and initiatives for its next…

5 hours ago

MG ZS EV now available for RM99,999: The cheapest electric SUV in Malaysia

You can now get an MG ZS EV for as low as RM99,999, making it…

6 hours ago

Prime Minister’s Department: Over 1,500 cyberattacks launched at ministries’ infrastructure systems

There have been over 1,500 cases of cyberattacks launched against Malaysian ministries' infrastructure systems in…

11 hours ago

This website uses cookies.