Skip to main content

The scary way someone could get into your iPhone WITHOUT knowing your passcode


iPhone 5se
GETTY IMAGES
Have you ever found an iPhone belonging to a stranger in a bar/taxi/the floor and wanted to find out who it belongs to so you can return it to its rightful owner, but have been blocked by a pesky passcode?
Aside from hoping and waiting for the phone's owner to make contact somehow, there's not a lot you can do in that situation. Until NOW, that is, when we've discovered a sneaky little hack which allows you to access the phone without using a four or six digit code to gain entry.
ADVERTISEMENT - CONTINUE READING BELOW
I'll preface this with a warning that I tried this trick a number of times, and although we were OVERWHELMED that it worked the first time, the phone seemed to wise up to my wily ways after that, and didn't work so smoothly. But it's worth a try nevertheless.
So here's how you do it, courtesy of YouTubers Social Star...
1. Hold down the home button until Siri appears
2. Ask Siri what the time is (but perhaps warn those around you that this is what you're doing, unless you want to be met with a choir of "quarter to ones" like I was)
3. When Siri displays the time, click on the image of a clock
4. This will bring up the World Clock/Alarm/Stopwatch/Timer screen, so click on the timer option
5. Then select 'When timer ends'
6. Scroll to the top of the ringtone list and select 'Buy more tones'
7. This should open the Apple Store
8. Click the home button again and it should bring up the main phone screen with full access to the phone...
Here is How it Works
FYI, when I tried this after the first time, it seemed to get stuck at point number 7 - despite clicking the 'Buy more tones' option repeatedly, it refused to open the Apple Store. So perhaps our phones are smarter than we think when it comes to security...
Obviously there's a worrying flipside to this hack, which is that it means somebody could gain access to your phone and the information contained within it, without your permission. But as long as the morally right purposes outweigh the more dubious ones, we'd say it's useful to know.
Happy hacking, folks (as long as it's for a good cause).

Comments

Popular posts from this blog

IMPORTANCE AND ADVANTAGES OF SIWES

STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) The Industrial Training/Students Industrial Work Experience Scheme, IT/SIWES is a new Directorate under the Vice-Chancellor’s Office.  It was established on 20th April, 2012 The Students Industrial Work Experience Scheme (SIWES) is a skills training programme designed to expose and prepare students of universities and other tertiary institutions for the Industrial Work situation they are likely to meet after graduation.  It is also a planned and structured programme based on stated and specific career objectives which are geared towards developing the occupational competencies of participants (Mafe, 2009).  Consequently, the SIWES programme is a compulsory graduation requirement for all Nigerian university students offering certain courses. The Students Industrial Work Experience Scheme (SIWES), is the accepted training programme, which

How to Reset HP Elitebook 8460p BIOS/Administrator Password

Have you  forgotten HP Elitebook 8460p password , bios or administrator account password? How to do if both of them lost? It seems hard though there may be lots of ways that can solve it. But if we talk about it separately, such as in two parts,  HP elitebook password reset  would be not so difficult. Part 1: Reset HP Elitebook 8460p BIOS password Part 2: HP Elitebook 8460p Administrator password recovery Part 1: How to Reset Forgotten HP Elitebook BIOS Password? Generally, there are two ways to  reset forgotten BIOS password .  One  is forcing BIOS/CMOS to reset itself to its stored defaults by removing all power from it.  The other  is to use a program to either locate or identify the password, and reveal it to you or erasing the password clearly. And the most easiest and convenient method for erasing dynamic BIOS/CMOS settings is to remove battery directly from the motherboard. However, it applies to most motherboards besides HP Elitebook BIOS. Fortunately, HP Eliteb

Ethical Hacking - TCP/IP Hijacking

TCP/IP Hijacking is when an authorized user gains access to a genuine network connection of another user. It is done in order to bypass the password authentication which is normally the start of a session. In theory, a TCP/IP connection is established as shown below − To hijack this connection, there are two possibilities − Find the seq which is a number that increases by 1, but there is no chance to predict it. The second possibility is to use the Man-in-the-Middle attack which, in simple words, is a type of network sniffing . For sniffing, we use tools like Wireshark or Ethercap . Example An attacker monitors the data transmission over a network and discovers the IP’s of two devices that participate in a connection. When the hacker discovers the IP of one of the users, he can put down the connection of the other user by DoS attack and then resume communication by spoofing the IP of the disconnected user. Shijack In practice, one of the best TCP/IP hijack too