New Lock Screen Security Bug Found in iOS 6.1.3

New Lock Screen Security Bug Found in iOS 6.1.3

Among the most serious bugs fixed with yesterday’s iOS 6.1.3 update was a pair of exploits allowing a hacker to bypass your iPhone’s lock screen and gain access to your Address Book and other information – but according to YouTube user  videosdebarraquito, that is unfortunately not the end of the story. As quickly as Apple patched those two exploits, a new lock screen exploit has been introduced in iOS 6.1.3.

The exploit can be seen in action in the above video, showing that the lock screen bypass update still exists in Apple’s latest update, although fortunately, it appears to only affect the iPhone 4. As with the previous exploits, the new bug allows access to your Camera Roll and Address Book info without the need to enter your passcode.

It’s worth noting that the new hack is more complex – it requires the attacker to use voice control to dial a number, then quickly eject your SIM card, after which the iPhone will show its recent call log. Hopefully Apple will patch this one sooner rather than later. In the meantime, iPhone 4 users would be well-advised to disable Siri and Voice Control access from the lock screen (can be configured in  Settings > General > Passcode Lock).