Patch fails to resolve lockscreen vulnerabilities
A newly-documented technique lets people bypass the lockscreen in iOS 7.0.2 and dial any phone number, not just emergency numbers. The method involves waiting for a notification, or forcing one by sending a text message or ejecting the SIM card. Once the notification pops up, a hacker has to swipe right on it while simultaneously swiping up on the Camera icon. While keeping a finger on the Camera icon, a person must then slide to unlock and tap the Emergency Call button. After dialing, hitting the Call button quickly two or three times should crash Springboard, but allow the call to go through once Springboard restarts.
The v7.0.2 update was itself meant to resolve earlier lockscreen vulnerabilities. The person credited with discovering the new bug, Dany Lisiansky, notes that he also recently found a v7.0.2 vulnerability allowing someone to skip the lockscreen via Siri or Voice Control and access photos, emails, and messages. Apple has had a recurring problem with new versions of iOS enabling lockscreen bypasses, which it then has to quickly close.
Android users are probably familiar with the Swype keyboard which basically allows users to type on their phones just by swiping (or “swyping”) between characters versus pecking at individual letters one at a time. In fact one iOS developer has event attempted to port Swype onto iOS devices although it didn’t exactly take off. However it seems that Apple did think about keyboard alternatives back in the day, and thanks to a recent patent that was published, it looks like Apple’s idea was pretty similar to Swype. According to the patent filing, it was filed for back in 2007 which is the same year that the first iPhone debuted, suggesting that Apple was already looking for keyboard alternatives for touchscreen devices back in the day.
However given that it’s 6 years later and the only revision to the Apple keyboard on iOS would be its design, it’s safe to say that Apple decided not to pursue this idea, or other keyboard ideas the Cupertino company and its team might have cooked up then. In any case Apple’s keyboard is more than functional and is pretty accurate as far as onscreen keyboards are concerned.
By default, iOS 7 will track and record places that you visit most often to provide better location-based data such as in the Today summary of Notification Center. If you value your privacy more than you do location-based data, you can turn the feature off. Turning off features like these can also help save a bit of battery life too.
1. Launch the Settings app from the Home screen of your iPhone or iPad.
2. Tap on Privacy.
3. Now tap on Location Services at the top.
4. Towards the bottom of the next screen, tap on System Services.
5. Again, towards the bottom of the next page, tap on Frequent Locations.
6. At the top of the next screen, turn the Frequent Locations option to the Off position.
That’s all there is to it. Locations you travel to most will no longer be tracked. While this comes at the expense of not having as accurate location data in places like the Today Summary screen, it also preserves your privacy better and to a lot of us, that’s more important.
Could solar technology power our iPhones or iPads in the future? Or perhaps even Apple’s Mac computers? While that question remains unanswered for now, it seems that at the very least Apple is interested in the technology, thanks to a recent job listing on Apple’s website which calls for a “thin films” engineer who has experience in the solar industry to join Apple’s Mobile Devices group, with the job description reading, “assist in the development and refinement of thin films technologies applicable to electronics systems.”
Given that the job was for a position in the Mobile Devices division, it has been speculated that perhaps it could be used on future iPhone or iPad products, although others have suggested that maybe it could see integration in display and touch technology as well, maybe for future iWatch devices, perhaps? Solar technology is not new to Apple as the company has in the past used the technology with its data centers, so to see Apple trying to find a way to incorporate the technology into their other products would not be a stretch of the imagination.
Hot on the heels of a vulnerability that gave snoopers the ability to bypass the iPhone’s passcode in iOS 6 and make calls, view and modify contacts, and even access to photos via the Contacts app, is a new one that allows the entire contents of the handset to by synced with iTunes.
“The vulnerability is located in the main login module of the mobile iOS device [applies to iPhone or iPad] when processing to use the screenshot function in combination with the emergency call and power button,” said Vulnerability Lab, who initially discovered the flaw.
The vulnerability allows anyone with physical access to the iOS device the ability to easily bypass the passcode lock and use a USB cable to get access to the data stored on the iPhone or iPad from a Mac or PC.
Below is a video demonstrating the vulnerability.
This is a very serious vulnerability indeed, as it means that someone could get access to data stored on an iOS device without leaving a trace. While home users might not like the idea of family and friends snooping through their data, it’s businesses who use iPhones and iPads that need to be really worried. This vulnerability means that storing sensitive information on an iOS 6 is not a good idea, and additional steps need to be taken to protect the data.
A security flaw in Apple’s iOS 6.1 lets anyone bypass your iPhone password lock and access your phone app, view or modify contacts, check your voicemail, and look through your photos (by attempting to add a photo to a contact). The method, as detailed by YouTube user videosdebarraquito, involves making (and immediately canceling) an emergency call and holding down the power button twice. We followed the steps and managed to access the phone app on two UK iPhone 5s running iOS 6.1. This isn’t the first time this has happened — a very similar bug affected iOS 4.1 and was fixed in iOS 4.2. We’ve reached out to Apple for comment and will update you once we hear back.
Watch this Youtube Video demonstration of the hack.
Source: The Verge
Apple has revealed the Cupertino company’s plans to use electromagnetic induction technology in their products in the future. Electromagnetic Induction is basically a production of an electric current in a conductive element as it moves through a magnetic field, which in turn is used to generate power.
Apple will be introducing this technology somehow in their products in the future but unlike the more traditional method of electromagnetic induction, Apple’s version will use printed coils with moveable magnets, while the typical version is the opposite where a coil will move around a stationary magnet. Seen below.
According to the patent, it can be mounted onto a portable device with Apple’s iPod and iPhone used as examples.