A security flaw of the iOS 7 was identified involving Apple's Control Center which can be used to bypass the passcode security lock of iPhone and iPad screens updated with the latest software. The bypass allows the hackers to access Photos, Mail, Twitter, and other device applications.
The ingenious feat, found Thursday by Jose Rodriguez, was a little challenging but was confirmed to work successfully. It brings back a similar incident when the iOS 6.1 was infected with a lock-screen bug which let the hacker reach Photos, Voicemail, and Contacts through a complicated sequence of commands.
According to Fortune, the newly found vulnerable attribute is particular to the Control Center-- a new feature in the latest operating system which enable users to make quick accesses to the commands and apps frequently used.
Apple Insider shares the bypass process which starts with invoking the Control Center through the use of the swipe of the secured iPhone or iPad from bottom up. After that, the Clock could already be accessed without the passcode. Now when the power is held down, the shut off pane will come up.
The next step is a bit tricky but could be done after some practice. Choose to cancel the shut off command instead of swiping to power off the iPhone or iPad. Quickly press on the home button, one short quick press then one long-press. The device will then go to the multitasking view of the iOS 7 where the Photos, Mail and Twitter apps could be opened.
This act could be avoided by merely disabling the Control Center on the devices' lock screen. To do this, go to Settings then to Control Center. When you find the "access on Lock Screen, switch it off.
However this will limit the capabilities of the new OS. It is best to take note too that the granted access is only limited to applications already running before the iPhone or iPad was locked. Those not accessible in the multitasking pane are also not affected.
Apple's spokesperson Trudy Muller confirmed to AllThingsD, "Apple takes user security very seriously." The company is already working on the issue and will soon provide a fix through a software update with no specific date given.
© 2025 HNGN, All rights reserved. Do not reproduce without permission.




