Apple Applies Server-Side Patch To Fix Siri-Initiated Passcode Bypass Exploit
The hack, if you want to call it that, was made possible by a rather odd bug in iOS 9.3.1. For it to work, Siri must have access to the iPhone owner's Twitter account. The handset must also support Force Touch, limiting the vulnerability to iPhone 6s and iPhone 6S Plus models. And the last requirement is finding a Twitter post containing someone's email address.
If all those factors are in play, the weird bug would let a curious co-worker or anyone else who came in possession of your iPhone take a peek inside—all they had to do was press down on the part of the Twitter post containing an email address and the 3D Touch feature would call up a menu to add a new contact or edit an existing one. From there, the person snooping on an iPhone could choose to edit a contact's photo, which would give them access to the handset's camera roll, too.