-
Tips for becoming a good boxer - November 6, 2020
-
7 expert tips for making your hens night a memorable one - November 6, 2020
-
5 reasons to host your Christmas party on a cruise boat - November 6, 2020
-
What to do when you’re charged with a crime - November 6, 2020
-
Should you get one or multiple dogs? Here’s all you need to know - November 3, 2020
-
A Guide: How to Build Your Very Own Magic Mirror - February 14, 2019
-
Our Top Inspirational Baseball Stars - November 24, 2018
-
Five Tech Tools That Will Help You Turn Your Blog into a Business - November 24, 2018
-
How to Indulge on Vacation without Expanding Your Waist - November 9, 2018
-
5 Strategies for Businesses to Appeal to Today’s Increasingly Mobile-Crazed Customers - November 9, 2018
Lock screen flaw found in Android
After finding out about the security hole Google promptly released a fix for their Nexus devices, describing the vulnerability as of “moderate” severity.
Advertisement
For instance, according to SplashData, too many users use passwords that are easy to crack, such as “123456” or “qwerty” and Android lock patterns tend to be dangerously predictable also.
They found that trying to unlock the phone or tablet with an abnormally long password caused the lock screen to crash in certain conditions. After this, any app can be run and developer access can be enabled to acquire complete control of the device and mistreat whatever sensitive data it might hold.
However, for the technique to succeed, John Gordon, security analyst at the University of Texas, said that the camera application was active throughout the procedure.
The issue is limited to phones that use a password rather than a PIN or pattern. Unfortunately a flaw in Android Lollipop makes it possible to get through with nothing but a bunch of gibberish. The resultant long string can then be copied and pasted on the password prompt. Then go to Settings and wait for the smartphone to request a password.
Google has released a patch for its Android operating system last week, which contained a fix for the bug CVE02015-3860.
Fortunately, the vulnerability was introduced in version 5, so the number of affected handsets is only a small fraction of the overall Android user base.
Google responded to this vulnerability by saying “we have not detected customer exploitation of the newly reported issues”, on a recent security bulletin. With some 1 billion Android smartphones, tablets and other devices in use around the world, that’s great.
Advertisement
Approaches to breaking through lock screens on phones are numerous, many merely involving an SD card with the right hack installed on it. Following the Stagefright bug, which sent malware to phone systems via MMS videos, LG promised to offer its users monthly updates. You need that text field because the hack relies on pasting text into that field to crash the lock screen.