ios 6.1.2
The fruit company Apple's latest firmware iOS 6 is going haywire in terms of security vulnerabilities and bugs. Previously, in iOS 6.1 a similar lockscreen bypass bug granted access to the phone app, contacts and photos. But now a much more potentially dangerous  lockscreen exploit has been found that can easily allows the attacker to get past the lockscreen and also grants complete access to your idevice’s personal data like messages, photos, etc if it is plugged into a computer. Read more on how to bypass the password lock in iPhone easily.




The only difference between the previous lockscreen bug found on iOS 6.1 is that it didn’t allow the attacker access to all of the idevice's data when plugged in via USB while this iOS 6.1.2 bug does. This passcode lock exploit manipulates the iPhone’s screenshot feature, its emergency call feature and the power button to gain unauthorized access into the iPhone. However, this bug is limited to the iPhone only as other devices don't have the emergency calling feature.  

How to bypass iPhone's lockscreen passcode lock 

  • Ensure there is a passcode lock enabled on your iPhone and then lock your idevice by pressing the sleep/wake button 
  • Wake your idevice by tapping the sleep button 
  • Tap Emergency Call   
  • Now dial 911 and then immediately hang up the call 
  • After cancelling the call, tap the sleep/wake button again to put your idevice in sleep mode, wake it up and then perform the Slide To Unlock gesture 
  • Hold down the sleep/wake button for roughly 3 seconds and just before the Slide To Power Off window appears, tap the Emergency Call keeping your finger on the sleep/wake button 
  • Keep holding the sleep/wake button and you have gained access to the phone app and if you have plugged it into a computer via USB you can access all data or information stored in the device 
Now, Apple's surely got some work to do, firstly, patching the evasi0n iOS 6 jailbreak untethered and secondly, this lockscreen bypass bug in the iOS 6.1.3 release.