Just a few weeks ago, Apple fanatics were thrilled with the smartphone giant releasing its latest software update, the iOS 6.1. But it didn’t take long for the complaints from iPhone 5 and iPod Touch owners to mount up as error messages, bugs, battery-drain issues and other glitches plague their device that not even resetting network connections can fix.
Shortly after that, Apple released an ‘improved’ version of the software – the iOS 6.1.1 to fix the ongoing problems but the new version only fixed the troubles of the iPhone 4S users, not of those with other Apple devices. And today, the latest report shows that bugs and glitches aside, the iOS 6.1 also got issues involving passcode vulnerability.
Late last week, the world was updated with the latest Apple woes brought by the iOS 6.1 update which ranges from network connectivity to battery drainage. The most serious problem, though, was its 3G issue that invariably caused Microsoft Exchange 2010 servers to just stop. Apple users who would want to read emails or check their calendar was treated with a grinding performance halt as log files begin to swell that caused ‘excessive logging’ on the server. But that was before a hacker unscrupulously posted a YouTube video outlining how can anyone can easily bypass the iPhone lock screen, which can potentially give hackers access to an updated device’s personal information such as contact, photos and e-mails.
The hack exploits a loophole that includes a user’s cancellation of emergency call and a series of button presses, which when done accurately, is definitely a very serious security issue. Though Apple acknowledged the users’ concerns regarding the update with the release of another version of the software with Microsoft’s help, the iOS 6.1.2, reports indicate that it only fixes the Exchange server bugs but not the security lock-screen issues.
Some tech geeks from online publications such as ZDNet and Ars Technica, tried to bypass a 6.1.2-updated device’s lock screen with different results: using the same steps posted on YouTube, ZDNet has failed to bypass the lock-screen but Ars Technica still managed to do so following the same steps. Reports that using a more complicated passcode can definitely solve this problem is also scratched by Ars Technica, saying that another user tried to do the same bypassing steps on a device with complex passcode and has still successfully managed to hack the phone’s information.
Are you one of those still pulling their hair out with Apple’s latest software woes? Share with us your experiences with “improved” iOS 6.1.2. Tell us what you think by joining our comments section below or head over to Mobile Phone Checker and tell us there, and while you're on there see what iPhone 5 deals we have and what the news is on the iPhone 5S deals and 6 that are out soon.