It's been a bad day for Apple (Jacqui Cheng, Ars Technica):
Just a day after Apple released iOS 6.1.3, a new lock screen bug has been discovered that could give an attacker access to private information. The vulnerability is different from the passcode bug(s) addressed by Tuesday's iOS update, but the end result is similar: access to iPhone's contact list and photos.
Also a bad day for Samsung (Chris Davies, SlashGear):
A new Samsung lockscreen hack has been identified, allowing unofficial access to PIN-secured Galaxy smartphones through a combination of keypresses and commands, though Samsung is apparently working on a software fix. The exploit relies on brief visibility of the phone’s display, unlocked, after a failed emergency call placed from the lockscreen; though ponderous, you could use that access to download a screenlock disabler from the Google Play store.
This isn't the first time that Apple and Samsung have had issues with securing their lock screens. They both desperately need to get their act together. Users need their devices to be reasonably secure.