Consumerization and Mobile Security


How to bypass the iPad password in 5 second

*** UPDATED AS OF 11/14/2011: I can confirm that Apple has fixed this security flaw in iOS 5.0.1 (9A405) ***

http://www.youtube.com/watch?v=ZPHDm88-HAc

Watch how to crack the iPad password in 5 secondsThe consumerization of IT is the single most influential technology trend of this decade. Companies are already well aware of it, as they wrestle with the growing influence of smartphones, tablets, Facebook, Twitter, Dropbox and on and on. While this growth does bring business value, too many companies make the mistake to trust consumer technology with corporate sensitive data without deploying appropriate enterprise-grade infrastructure to secure and manage it. Consumer technology is sexy, convenient and easy to use. When it comes to security and data protection however, consumer technology still has a long way to go. Security and data protection in fact remain top concerns among IT professionals – see The Consumerization Report 2011.

One of the most evident aspects of the Consumerization of IT is represented by the influx of consumer mobile device in the enterprise. Two mobile platforms have quickly gained the majority of this market: the Apple iOS that powers iPhones and iPads and its close competitor Android. The ongoing debate among IT professionals these days is whether Apple iOS is more secure than Android and whether the strict control that Apple exercises on operating system and applications actually results in a more secure platform.

Well, as it turns out the Apple mobile operating system is not so secure after all, as shown by the recent discovery of a new security flaw affecting Apple’s best selling device: the iPad 2. The password protection of the new iPads running iOS 5 can in fact be easily bypassed in less than 5 seconds with these simple 3 steps:

  1. Press the reset button until the power-off screen is displayed
  2. Close and reopen the smart-cover
  3. Press the cancel button

Voila. At this point the password protection is removed and anyone can freely access the foreground application that was running at the time when the device was initially locked. This potentially exposes sensitive corporate data accessed through corporate email, stored in attachment or available through various enterprise applications. Given that the access gained in this way is limited to the foreground application, the obvious workaround is to instruct the users to close any foreground application before locking the iPad.

More on Consumerization, Enterprise Mobility and Mobile Security at http://us.trendmicro.com/us/trendwatch/consumerization/

Press Contact:

Andrea Mueller

Trend Micro – Global Public Relations

Andrea_Mueller@trendmicro.com

About Cesare Garlati
Co-Chair Cloud Security Alliance - Consumerization, BYOD and Mobile Security.

7 Responses to Consumerization and Mobile Security

  1. Pingback: iPad security hole lets you bypass lock screen by using Smart Cover | iDevices News

  2. 5 SECONDS to bypass an iPad 2 password

    Foreground fudge-up

  3. Cracking the iPad 2 lock screen: All you need is a Smart Cover.

    What do you need to break into a locked iPad 2? Believe it or not, all you need is an official Apple Smart Cover.

  4. Yikes! Your iPad unlocked in 5 seconds

  5. Yet another reminder why Apple really isn’t enterprise ready

  6. iPad security hole lets you bypass lock screen by using Smart Cover

    What’s the solution for enterprise users? Slightly less email and slightly more Angry Birds, perhaps

  7. Pingback: Mobile industry news from thefonecast.com

Follow

Get every new post delivered to your Inbox.

Join 26 other followers

%d bloggers like this: