Apple has released iOS 6.1.2 a week ago to address, among other things, a failure that allowed bypass the lock screen of the iPhone and password select data on the device. But to the dismay of Apple, plus a password bypass vulnerability was discovered that once again lets users know that accessing a locked device without knowing the four-digit PIN.
The second vulnerability surfaced this month is similar to the first, which involved the use of the function of the phone screen, emergency call feature and the power button to bypass the lock screen. From there, however, accounts vary as to the level of access that you may have.
The original note on the Full Disclosure blog says that this new method allows an attacker to gain access to the phone book and voice mail contact list. Connect the device to a computer via a USB cable and you can still access other data such as photos allegedly without the password. The latter, however, can be only partially true.
According to TNW, the system user files are encrypted and unviewable on a computer when the iPhone has a passcode enabled. The problem here is that if the iPhone was connected to a computer and once unlocked, then your file system will always be visible on the machine. If your phone has never been connected to a particular computer and unlocked, this court will not grant any access magician.
In related news iOS, Apple is testing the latest beta version of software that prevents the use of evasi0n popular jailbreak software. One of the creators evasi0n was recently able to test and confirmed the update patch, tell us. It is unclear at this time when we can expect to see the iOS 6.1.3 which fixes or specific to accomplish.