This video shows the steps that Hashim took to access the iPhone through the lock screen by using Siri:
When Siri is triggered from the lock screen, Hashim first says “contacts”, hoping to be taken directly to the contacts page. However, the app denies his request, saying that he must first unlock the phone. He then tries the trick again, only this time with the command “call”. This allows Hashim to access the contacts list by bringing up the “Other…” menu when presented with the a request for a contact with a duplicate name.
This flaw is present in all iPhone versions running Siri, and is capable of revealing far more than just phone numbers. Hackers can potentially gain access to any information from the contact card, such as your contact’s home or email addresses. You don’t want hackers to know where you, your friends, or family live, and you risk more than just data theft – the rest of your valuables could very well be on the line.
Fortunately, this can only occur when a hacker is in physical possession of your phone. Though this vulnerability is somewhat limited because of this, it is still a good idea to turn Siri off from your Passcode options via the General settings of the device. Otherwise, you risk the deceptively-faithful iOS app betraying your contact information to a thief. Don’t let them smooth-talk their way through Siri.
For more updates and information concerning the latest vulnerabilities, patches, and updates, contact COMPANYNAME at PHONENUMBER. Knowledge is power, and we’ll give you all the information you need to protect yourself from the latest threats and vulnerabilities.