iPhone Hacking Guide Posted to YouTube
Security analysts are warning that a new iOS 6.1 hack could allow someone to bypass the security of an iPhone 5 and covertly spy on a user's private messages and conversations.
The majority of Apple iPhone owners currently have some kind of password lock screen protecting their device. However, a YouTube video (aptly named "How to Bypass iPhone 5 Passcode on iOS 6.1") provides step-by-step instructions for getting around this security wall.
Once a device has been compromised, hackers have complete access to the emails, photos, etc. stored on the phone. When attempting to delve deeper into the software, however, the hacker is sent back to the passcode screen and the process is repeated.
Step-by-Step Guide to Hacking iPhone
The tutorial itself is a bit confusing, as the individual behind it does very little talking. However, if the step-by-step guide the video's producer provides is carried out correctly, the would-be hacker is able to listen to private conversations as if they were a participant in the call. (Source: yahoo.com)
The video was actually published at the end of January, but was not well-known until this past week.
The video's producer, whose user name is "videosdebarraquito," tells viewers they should use the guide "For prank[ing] your friends," or "for a magic show."
"Use it as you want," he goes on, before adding, "please ... do not use this trick to do evil."
Apple Fix Coming in Future Update
Apple has reportedly acknowledged the security vulnerability and promises to mend the issue in due time. According to Apple, the company "takes user security very seriously. [They] are aware of the issue and will deliver a fix in a future software update." (Source: pcadvisor.co.uk)
In the meantime, there is one thing iPhone users can do to prevent themselves from being attacked.
Reports indicate that the hack won't work properly when passcodes are text-based, so those with a classic four-digit numerical pin are considered most at risk.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.