Geek Posted October 21, 2011 Posted October 21, 2011 <div class="KonaBody"><p><img src="http://osxdaily.com/wp-content/uploads/2011/10/ipad-passcode.jpg" alt="Bypass the iPad 2 passcode" title="ipad-passcode" width="150" height="189" class="alignright size-full wp-image-22770" /> Well here’s a security flaw in <a href="http://osxdaily.com/tag/ios-5/">iOS 5</a> that will quickly get patched: anyone with a magnet (or a Smart Cover) can bypass the iPad 2′s locked passcode screen and access whatever app was previously left open. The passcode bypass was discovered by <a href="http://9to5mac.com/2011/10/20/anyone-with-a-smart-cover-can-break-into-your-ipad-2/">9to5mac</a>, who recorded a video demonstrating the security breach (embedded below).</p> <p><strong>From a locked iPad 2:</strong></p> <ul> <li>Hold down the power button until the the slider appears across the top</li> <li>Close the iPad 2′s Smart Cover or swing a magnet over the magnetic points around the screen rim, then remove the Smart cover or magnet</li> <li>Click “Cancel” at the bottom of the lock screen</li> </ul> <p>You’re now at the iOS 5 springboard, but the biggest security threat is when users have left an app open with sensitive data, since the lockscreen is bypassed directly to it. This could mean </p> <p><strong>Protection Against the iPad 2 Lock Screen Bypass:</strong> For the time being, iPad 2 users are encouraged to disable the “Smart Cover unlocking” feature found in Settings > General. </p> <p>Here’s the video showing the password bypass: <iframe width="610" height="340" src="http://www.youtube.com/embed/NLgQ22naQhE?rel=0" frameborder="0" allowfullscreen></iframe></p> </div> <p><a href="http://feedads.g.doubleclick.net/~a/geUVW-k8YfPJJ1XBmKgiVcglT8A/0/da"><img src="http://feedads.g.doubleclick.net/~a/geUVW-k8YfPJJ1XBmKgiVcglT8A/0/di" border="0" ismap="true"></img></a><br/> <a href="http://feedads.g.doubleclick.net/~a/geUVW-k8YfPJJ1XBmKgiVcglT8A/1/da"><img src="http://feedads.g.doubleclick.net/~a/geUVW-k8YfPJJ1XBmKgiVcglT8A/1/di" border="0" ismap="true"></img></a></p><div class="feedflare"> <a href="http://feeds.feedburner.com/~ff/osxdaily?a=aPMV8gomOoM:g_Ob1S9Lfpo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/osxdaily?d=yIl2AUoC8zA" border="0"></img></a> <a href="http://feeds.feedburner.com/~ff/osxdaily?a=aPMV8gomOoM:g_Ob1S9Lfpo:V_sGLiPBpWU"><img src="http://feeds.feedburner.com/~ff/osxdaily?i=aPMV8gomOoM:g_Ob1S9Lfpo:V_sGLiPBpWU" border="0"></img></a> <a href="http://feeds.feedburner.com/~ff/osxdaily?a=aPMV8gomOoM:g_Ob1S9Lfpo:D7DqB2pKExk"><img src="http://feeds.feedburner.com/~ff/osxdaily?i=aPMV8gomOoM:g_Ob1S9Lfpo:D7DqB2pKExk" border="0"></img></a> <a href="http://feeds.feedburner.com/~ff/osxdaily?a=aPMV8gomOoM:g_Ob1S9Lfpo:7Q72WNTAKBA"><img src="http://feeds.feedburner.com/~ff/osxdaily?d=7Q72WNTAKBA" border="0"></img></a> <a href="http://feeds.feedburner.com/~ff/osxdaily?a=aPMV8gomOoM:g_Ob1S9Lfpo:qj6IDK7rITs"><img src="http://feeds.feedburner.com/~ff/osxdaily?d=qj6IDK7rITs" border="0"></img></a> </div><img src="http://feeds.feedburner.com/~r/osxdaily/~4/aPMV8gomOoM" height="1" width="1"/> View the full article
Recommended Posts