Search This Blog

Powered by Blogger.

Blog Archive

Labels

iOS 9 Lockscreen Bug That Lets Hackers to access Your Photos And Contacts

Whatever and whenever Apple launches its products or software it attracts biggest attention than any other company. The reason behind this might be the craze for the Apple products around the world.
Whatever and whenever Apple launches its products or software it attracts biggest attention than any other company. The reason behind this might be the craze for the Apple products around the world.

Its less than a week when Apple launched its ios 9, nearly 50% of its devices are running on its ios 9. One of the most exciting features are the split view or basically the ability to use two apps at once,  includes faster performance and improved battery life, and security enhancements.

When the whole world is busy in appreciating the new ios,  Jose Rodriguez discovered a serious security flaw in this newly launched ios.

Rodriguez has posted a YouTube video demonstrating the security flaw, Vid,  which allows Siri to access information on the handset from the PIN unlock screen.

In the video, Rodriguez enters an incorrect password, then asks for the time through voice controlled device, once it displays the time, you are able to search and share function, then through iGadget you can pull owner's contacts, messages, and photos via the Share screen, without entering a correct password.

The best way to avoid the voice-activation flaw  is to disable Siri  on the lock screen.

The other major problem that users are facing with ios 9 is problem in updating their firmware and running bluetooth devices.

New feature, Wi-Fi Assist, may shot up your data usage. This feature will automatically turn on your mobile data when it encounters weak Wifi signal. It is an attempt to ensure that  users don’t experience any buffering when on a weak WiFi signal.

We didn’t mean to discourage you from updating your Apple device if you haven’t or you had, but to caution you from the flaws of the new ios.
Share it: