Binu Paul email: b.paul@mobilenapps.com
Apple had a tough time fixing the lock screen bypass bug that came along with its recent iOS 6.1 update and now, it's revealed that a similar bug allows hackers to bypass the lock screen on Samsung Galaxy S3 and Samsung Galaxy Note 2.
According to initial reports, the lock screen could be bypassed momentarily but now, it's found that the vulnerability allows hackers to break the lock screen on Galaxy S3 handsets completely. The bypass method was first brought on to the public notice by Terence Eden who discovered a bug with which one could briefly access the home screen on his Galaxy Note 2. This was shortly followed by a separate post on the Full Disclosure mailing list by another individual named Sean McMillian who detailed a variation on the original method that allows for full access to the Samsung device, ZD Net reports.
Testing the bug on three different Galaxy S3 devices, McMillian confirmed the bug and concluded that the issue is more of a Samsung's software related bug than a widespread Android issue. According to the new method, when followed correctly, it enables anyone to access the handset's home screen without having to correctly enter the lock screen and most importantly, it does not necessitate the attacker to enter the pattern, PIN, or other lock method in place once the bypass has been successfully used.
According to McMillion, if the hacker locks the screen and then unlocks it again instead of launching an application on the home screen, the vulnerability would allow full access to the phone. The folks at ZD Net claimed to have confirmed the complete bypass on Galaxy S3 running Android 4.1.2 while acknowledging that the timing to replicate the issue is very small and difficult to replicate at first. "Once bypassed, the bug appears to persist, even when the phone's screen is turned back off, no longer challenging the user for their PIN, password, or pattern," the report says. However, they were not able to completely bypass the lock screen on Galaxy Note 2 running Android 4.1.1.
Follow the below-given instructions provided by McMillian (via ZD Net) to verify if your device is vulnerable:
Step 1: On the code entry screen, press Emergency Call.
Step 2: Press Emergency Contacts.
Step 3: Press the Home button once.
Step 4: Just after pressing the Home button, press the power button quickly.
Step 5: If successful, pressing the power button again will bring you to the S3's home screen.
Check out the video below to see the original method by Eden (Via Engadget):
related stories
more stories from Mobile
With Google Messages, you can now enjoy a new audio recorder and voice moods, enhancing your messaging experience. Check it out today!
ernest hamiltonThe iOS 17.5 RC release brings several enhancements, including updates to the Podcasts widget, an improved unwanted tracking system, Repair State mode, and more.
ernest hamiltonThe decision to revoke export licenses to Huawei could have significant implications for chip sales by Intel and Qualcomm in the US.
ernest hamiltonExperience innovation like never before with Samsung's upcoming Galaxy S25 Series, set to introduce the groundbreaking 'Battery AI' feature. Learn more in our latest article!
ernest hamiltonThe leaked promo images of the Sony Xperia 1 VI reveal exciting details ahead of its launch. Dive into the details in our latest article!
ernest hamiltonGoogle's enhancement of the two-factor authentication setup process gives users more control over their security. Learn how in our latest article!
ernest hamiltonSamsung might switch from AMD RDNA cores to an in-house GPU for the Exynos 2600 SoC. Stay tuned for updates.
ernest hamiltonDiscover the latest: Google Maps gets a major redesign! Explore the updates in action on Android.
ernest hamilton