Wednesday, May 14, 2025
HomeSecurity NewsWomen in China Unlocked iPhone X Using Her Friend Face ID

Women in China Unlocked iPhone X Using Her Friend Face ID

Published on

SIEM as a Service

Follow Us on Google News

A Women in China was able to unlock iPhone X through her friend facial recognition ID without using any 3D print hardware and face mask.

It was her second iPhone X and both have failed in this facial recognition software future to unlock her iPhone x using friend face.

Yan(surname) who is living in China has configured with her face ID in each iPhone’s facial recognition software and it was unlocked each and every attempt using her friend face.

- Advertisement - Google News

Few weeks before hacker was successfully Cracked into iPhone X Face ID with 3D Printing Mask which costs just 150 USD. they have used 3D printer and the nose part designed by a handmade artist.

Also Read:  Beware!! Hackers Using New Tools to Break open Apple iCloud Accounts to Unlock Stolen iPhone’s

Unlock iPhone X

According to Scmp , Yan called to Apple hotline recording her issue but Apple staff would not believe her. later she went Apple store along with her friend and proved it with colleague used facial recognition.

An Apple Spokesperson said, “he couldn’t confirm the details of the story, nor did he have enough information to determine what might have gone wrong with the phones.”

He suspected that both women may have used the phone during its “passcode training” and that the phones may have been essentially “taught” to recognize both faces.

In this case, Store gave a refund and said the camera might be faulty, but again she bought new iPhone X and she faced a problem with new iPhone X as well. Unless Apple technicians examine the Chinese phones, it’s unclear what happened.

Apple has said that the facial recognition software has run into some glitches. It can sometimes mistake twins or siblings, twins might be able to unlock the iPhone X using Face ID, but even that is supposedly very rare.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Windows Ancillary for WinSock 0-Day Vulnerability Actively Exploited to Gain Admin Access

Microsoft has confirmed active exploitation of a critical privilege escalation vulnerability in the Windows...

Earth Ammit Hackers Deploy New Tools to Target Military Drones

The threat actor group known as Earth Ammit, believed to be associated with Chinese-speaking...

New Microsoft Scripting Engine Vulnerability Exposes Systems to Remote Code Attacks

Critical zero-day vulnerability in Microsoft’s Scripting Engine (CVE-2025-30397) has been confirmed to enable remote...

Critical Microsoft Office Vulnerabilities Enable Malicious Code Execution

Microsoft has addressed three critical security flaws in its Office suite, including two vulnerabilities...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...

UK Government to Shift Away from Passwords in New Security Move

UK government has unveiled plans to implement passkey technology across its digital services later...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...