Skip to main content

iOS 6.1 lock-screen bypass fumble highlights BYOD fragility


iphone-lock-screen
The Verge first noticed (via Techmeme) that iPhone and iPad users running the latest iOS 6.1 platform can bypass the lock screen, even when a password is set. 
No matter how secure your password is, by fumbling around with a few buttons in sequence, your password-enabled iPhone or iPad is laid open for anyone to potentially rifle through parts of your phone or tablet.
Are the alarm bells ringing yet? Engage the panic switch.
Your entire mobile enterprise and bring-your-own-device (BYOD) plan at work just crumbled because Apple inadvertently allows unauthorized users to gain access to local device data, including in some cases server-stored contacts, voicemail, and photos.

Read this

Does jailbreaking or rooting devices, and BYOD mix?
The short answer is no. The slightly longer answer... definitely not.
And for now there's nothing you can do about it. 
You can have the strongest password, the enhanced security features, the remote wipe functions set up, and all kinds of policies enabled, but in this case all those features become instantly redundant. And, until Apple fixes it—which could be many days or even weeks from now, considering their past track record—some of your corporate data is vulnerable to unauthorized access.
There's no way to sugar coat it. If your enterprise runs iPhones and iPads, in spite of your mobile device management setup, corporate data—in varying form—could be accessed by anybody who now knows the very, highly publicized bypass sequence.
With enhanced security, strong policy management, back-end mobile device management (MDM) services to prevent data leaks, breaches and security lapses—it can all unravel when you realize your entire business is still at the mercy of the mobile maker getting the device's in-built security features right the first time around.
For some time, Apple has been gaining in the BYOD trend. Bring your own device to work, but you have to follow the IT policy guidelines to protect your company's data from harms way.
As governments and private sector companies alike are ditching the BlackBerry in favor of iPhones, while trying to avoid Android altogether—at least for now—Apple products are increasingly breaking through the enterprise wall. iPads are rolling out to businesses, and iPhones are being tested in the work environment, and all because of the strong
But bugs like this, that may seem small to fix but are huge in short term, erode away at the confidence in the platform, which up until now and despite the odd bug here and there, has been as strong as BlackBerry was during the late 2000s.
The bottom line: you can have the most secure environment for your BYOD employees and devices—in this case iOS 6.1 powered devices, which is probably most if not all of them—with MDM solutions plugging policies left, right and center to avoid human mistakes. But sometimes you're simply at the mercy of the mobile maker not screwing up in the first place.

Comments

Popular posts from this blog

How to Hack a Website in Four Easy Steps

Every wondered how Anonymous and other hacktivists manage to steal the data or crash the servers of websites belonging to some of the world biggest organisations? Thanks to freely available online tools, hacking is no long the  preserve of geeks , so we've decided to show you how easy it is to do, in just four easy steps. Step 1: Identify your target While  Anonymous  and other online hacktivists may choose their targets in order to protest against perceived wrong-doing, for a beginner wanting to get the taste of success with their first hack, the best thing to do is to identify a any website which has a vulnerability. Recently a hacker posted a list of 5,000 websites online which were vulnerable to attack. How did he/she identify these websites? Well, the key to creating a list of websites which are likely to be more open to attack, is to carry out a search for what is called a Google Dork. Google Dorking , also known as Google Hacking, enables you find sen

How to Hack Facebook Password in 5 Ways

Check out the following post from  fonelovetz blog  on facebook account hacking. This is one of the most popular questions which I'm asked via my email.And today I'm going to solve this problem one it for all.Even though i have already written a few ways of hacking a facebook password.Looks like i got to tidy up the the stuff here.The first thing i want to tell is.You can not hack or crack a facebook password by a click of a button.That's totally impossible and if you find such tools on the internet then please don't waste your time by looking at them! They are all fake.Ok now let me tell you how to hack a facebook account. I'll be telling you 5 of the basic ways in which a beginner hacker would hack.They are: 1.Social Engineering 2.Keylogging 3.Reverting Password / Password Recovery Through Primary Email 4.Facebook Phishing Page/ Softwares 5.Stealers/RATS/Trojans I'll explain each of these one by one in brief.If you want to know more about them just

How to Hack Someone's Cell Phone to Steal Their Pictures

Do you ever wonder how all these celebrities continue to have their private photos spread all over the internet? While celebrities' phones and computers are forever vulnerable to attacks, the common folk must also be wary. No matter how careful you think you were went you sent those "candid" photos to your ex, with a little effort and access to public information, your pictures can be snagged, too. Here's how. Cloud Storage Apple's iCloud service provides a hassle free way to store and transfer photos and other media across multiple devices. While the commercial exemplifies the G-rated community of iPhone users, there are a bunch of non-soccer moms that use their iPhones in a more..."free spirited" mindset. With Photo Stream enabled (requires OS X Lion or later, iOS 5 or later), pictures taken on your iPhone go to directly to your computer and/or tablet, all while being stored in the cloud. If you think the cloud is safe, just ask Gizmodo

How to Hack Samsung Phone Screen Lock

I have discovered  another  security flaw in Samsung Android phones. It is possible to completely disable the lock screen and get access to any app - even when the phone is "securely" locked with a pattern, PIN, password, or face detection. Unlike another recently released flaw, this doesn't rely quite so heavily on ultra-precise timing. Video . Of course, if you are unable to download a screen unlocker, this security vulnerability still allows you to  dial any phone number and run any app ! HOWTO From the lock screen, hit the emergency call button. Dial a non-existent emergency services number - e.g. 0. Press the green dial icon. Dismiss the error message. Press the phone's back button. The app's screen will be briefly displayed. This is just about long enough to interact with the app. Using this, you can run and interact with any app / widget / settings menu. You can also use this to launch the dialler. From there, you can dial any phone