Apple's Siri is helping users bypass iOS security

Share this article:

Siri was designed to be an effective personal assistant, but since the release of iOS 7, the artificial intelligence is bringing the bad with the good.

Apple released iOS 7.0.2 to address the first big passcode-bypass in its weeks-old iOS 7 mobile software, but it didn't take techies long to circumvent the passcode security feature in the latest version of the platform.

The workaround only grants access to the phone app, but from there people can use the phone to dial anywhere they wish, listen to saved voicemails, view and change contact information, access photos, use Twitter, login to email and shoot out texts.

Dany Lisiansky demonstrated the bug in a YouTube video, where he also posted step-by-step instructions on how to make it work. Several users have taken to the comments section and Twitter to confirm the exploit is genuine.

Anyone holding a locked iPhone or iPad in their hand can try it out by using Siri to make a phone call (to another iOS device within reach) and then clicking the FaceTime button. As soon as the FaceTime app pops up, hit the sleep button, and then wake up the device and “slide to unlock.”

Finally, answer and end the FaceTime request on the device receiving the call. In his video, Lisiansky mashes on the end button on the device he is compromising, and is sent to the phone where he is able to access the whole slew of features.

Apple's iOS 7 was released on Sept. 18 and users quickly realized that, whether locked or unlocked, Siri can be used to switch the device into airplane mode to effectively disable the "Find My iPhone" or "Find My iPad" apps. Airplane mode can also be activated in the Control Center, a feature new to iOS 7.

Within 48 hours, Jose Rodriguez, who gained fame in the past for finding ways to bypass Apple's iOS security protocols for lock screens, became the first to slip by the passcode feature in iOS 7.

Apple released iOS 7.0.2 on Thursday, which patched the flaw discovered by Rodriguez and additionally reintroduced the option to use the Greek alphabet keyboard for passcodes instead of just the four-digit numerical option.

Apple has not commented on the iOS 7.0.2 bypass issue, nor has the technology giant commented on the ability to replicate fingerprints to bypass the Touch ID sensor exclusive to the iPhone 5s.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters


More in News

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.

EU conducts massive cyberattack simulation on critical networks

Conducted by the European Union Agency for Network and Information Security, the simulation launched 2,000 attacks on the networks of various critical infrastructure organizations.