iPhone Hacking Guide Posted to YouTube

Dennis Faas's picture

Security analysts are warning that a new iOS 6.1 hack could allow someone to bypass the security of an iPhone 5 and covertly spy on a user's private messages and conversations.

The majority of Apple iPhone owners currently have some kind of password lock screen protecting their device. However, a YouTube video (aptly named "How to Bypass iPhone 5 Passcode on iOS 6.1") provides step-by-step instructions for getting around this security wall.

Once a device has been compromised, hackers have complete access to the emails, photos, etc. stored on the phone. When attempting to delve deeper into the software, however, the hacker is sent back to the passcode screen and the process is repeated.

Step-by-Step Guide to Hacking iPhone

The tutorial itself is a bit confusing, as the individual behind it does very little talking. However, if the step-by-step guide the video's producer provides is carried out correctly, the would-be hacker is able to listen to private conversations as if they were a participant in the call. (Source: yahoo.com)

The video was actually published at the end of January, but was not well-known until this past week.

The video's producer, whose user name is "videosdebarraquito," tells viewers they should use the guide "For prank[ing] your friends," or "for a magic show."

"Use it as you want," he goes on, before adding, "please ... do not use this trick to do evil."

Apple Fix Coming in Future Update

Apple has reportedly acknowledged the security vulnerability and promises to mend the issue in due time. According to Apple, the company "takes user security very seriously. [They] are aware of the issue and will deliver a fix in a future software update." (Source: pcadvisor.co.uk)

In the meantime, there is one thing iPhone users can do to prevent themselves from being attacked.

Reports indicate that the hack won't work properly when passcodes are text-based, so those with a classic four-digit numerical pin are considered most at risk.

Rate this article: 
No votes yet