Samsung Galaxy S III bug lets anyone bypass password-protected lockscreen

[email protected] (Anupam Saxena)
March 8, 2013

Samsung_Galaxy_S_III

A user has discovered a security flaw in the Samsung Galaxy S III that allows anyone to bypass the lock screen of the phone by following a few simple steps.

Sean McMillan has posted a method to access the lock screen of the Galaxy S II on a mailing list. According to him the bug can be reproduced by following these steps:

1) On the code entry screen (of the lock screen) press Emergency Call

2) Then press Emergency Contacts

3) Press the Home button once

4) Just after pressing the Home button, press the power button quickly

5) If successful, pressing the power button again will bring you to the S3's home screen

McMillan mentions that it might take a few attempts to get the hack working and that sometimes the method works in one go while at others, it can take more than 20 attempts. He also adds that the method seems to work better when the mobile has auto rotation turned on. McMillan claims to have tested the method on three Galaxy S III devices.

We tried unlocking the screen of a Samsung Galaxy S III(GT-I9300 running Android 4.1.2) using the same method but weren't successful.

However, ZDNET says they were able to replicate the hack after a few attempts. The site states that the timing to replicate the issue is very small and that it is difficult to replicate it in the first attempt. But after bypassing the screen once, the bug stays on the device even when the phone's screen is turned back off and the phone stops asking the user for their PIN, password or pattern.

Just a few days back, another user, Terence Eden, had discovered a security flaw in the Samsung Galaxy Note II that allowed anyone to bypass the lock screen and take a look at the home screen app icons by following similar steps. But the hack didn't allow the hacker to use any of the apps.

Last month, a similar vulnerability was discovered in Apple iOS 6.1, allowing users to bypass the lock screen, following which Apple had acknowledged the issue and promised a fix.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
April 17,2020

Paris, Apr 17: Even as virologists zero in on the virus that causes COVID-19, a very basic question remains unanswered: do those who recover from the disease have immunity?

There is no clear answer to this question, experts say, even if many have assumed that contracting the potentially deadly disease confers immunity, at least for a while.

"Being immunised means that you have developed an immune response against a virus such that you can repulse it," explained Eric Vivier, a professor of immunology in the public hospital system in Marseilles.

"Our immune systems remember, which normally prevents you from being infected by the same virus later on."

For some viral diseases such a measles, overcoming the sickness confers immunity for life.

But for RNA-based viruses such as Sars-Cov-2 -- the scientific name for the bug that causes the COVID-19 disease -- it takes about three weeks to build up a sufficient quantity of antibodies, and even then they may provide protection for only a few months, Vivier told AFP.

At least that is the theory. In reality, the new coronavirus has thrown up one surprise after another, to the point where virologists and epidemiologists are sure of very little.

"We do not have the answers to that -- it's an unknown," Michael Ryan, executive director of the World Health Organization's Emergencies Programme said in a press conference this week when asked how long a recovered COVID-19 patient would have immunity.

"We would expect that to be a reasonable period of protection, but it is very difficult to say with a new virus -- we can only extrapolate from other coronaviruses, and even that data is quite limited."

For SARS, which killed about 800 people across the world in 2002 and 2003, recovered patients remained protected "for about three years, on average," Francois Balloux director of the Genetics Institute at University College London, said.

"One can certainly get reinfected, but after how much time? We'll only know retroactively."

A recent study from China that has not gone through peer review reported on rhesus monkeys that recovered from Sars-Cov-2 and did not get reinfected when exposed once again to the virus.

"But that doesn't really reveal anything," said Pasteur Institute researcher Frederic Tangy, noting that the experiment unfolded over only a month.

Indeed,several cases from South Korea -- one of the first countries hit by the new coronavirus -- found that patients who recovered from COVID-19 later tested positive for the virus.

But there are several ways to explain that outcome, scientists cautioned.

While it is not impossible that these individuals became infected a second time, there is little evidence this is what happened.

More likely, said Balloux, is that the virus never completely disappeared in the first place and remains -- dormant and asymptomatic -- as a "chronic infection", like herpes.

As tests for live virus and antibodies have not yet been perfected, it is also possible that these patients at some point tested "false negative" when in fact they had not rid themselves of the pathogen.

"That suggests that people remain infected for a long time -- several weeks," Balloux added. "That is not ideal."

Another pre-publication study that looked at 175 recovered patients in Shanghai showed different concentrations of protective antibodies 10 to 15 days after the onset of symptoms.

"But whether that antibody response actually means immunity is a separate question," commented Maria Van Kerhove, Technical Lead of the WHO Emergencies Programme.

"That's something we really need to better understand -- what does that antibody response look like in terms of immunity."

Indeed, a host of questions remain.

"We are at the stage of asking whether someone who has overcome COVID-19 is really that protected," said Jean-Francois Delfraissy, president of France's official science advisory board.

For Tangy, an even grimmer reality cannot be excluded.

"It is possible that the antibodies that someone develops against the virus could actually increase the risk of the disease becoming worse," he said, noting that the most serious symptoms come later, after the patient had formed antibodies.

For the moment, it is also unclear whose antibodies are more potent in beating back the disease: someone who nearly died, or someone with only light symptoms or even no symptoms at all. And does age make a difference?

Faced with all these uncertainties, some experts have doubts about the wisdom of persuing a "herd immunity" strategy such that the virus -- unable to find new victims -- peters out by itself when a majority of the population is immune.

"The only real solution for now is a vaccine," Archie Clements, a professor at Curtin University in Perth Australia, told AFP.

At the same time, laboratories are developing a slew of antibody tests to see what proportion of the population in different countries and regions have been contaminated.

Such an approach has been favoured in Britain and Finland, while in Germany some experts have floated the idea of an "immunity passport" that would allow people to go back to work.

"It's too premature at this point," said Saad Omer, a professor of infectious diseases at the Yale School of Medicine.

"We should be able to get clearer data very quickly -- in a couple of months -- when there will be reliable antibody tests with sensitivity and specificity."

One concern is "false positives" caused by the tests detecting antibodies unrelated to COVID-19.

The idea of immunity passports or certificates also raises ethical questions, researchers say.

"People who absolutely need to work -- to feed their families, for example -- could try to get infected," Balloux.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 20,2020

In a bid to help struggling small businesses in Covid-19 times, Facebook has introduced Shops to help set up a single online store for customers to access on both Facebook and Instagram.

While Facebook Shops is being rolled out from Wednesday, the company will introduce Instagram Shop, a new way to discover and buy products in Instagram Explore, this summer, starting in the US.

The social networking giant also announced that it will invest in features across its family of apps to inspire people to shop and make buying and selling online easier.

"Creating a Facebook Shop is free and simple. Businesses can choose the products they want to feature from their catalogue and then customise the look and feel of their shop with a cover image and accent colours that showcase their brand," Facebook said in a statement late Tuesday.

Any seller, no matter their size or budget, can bring their business online and connect with customers wherever and whenever it's convenient for them.

People can find Facebook Shops on a business' Facebook Page or Instagram profile, or discover them through stories or ads.

"From there, you can browse the full collection, save products you're interested in and place an order — either on the business' website or without leaving the app if the business has enabled checkout in the US," informed the company.

Last month, Facebook announced $40 million in grants for 10,000 small businesses in the US to help them get through these challenging time.

The grants will go to small businesses in 34 locations where Facebook employees live and work.

The company said that in Facebook Shops, users will be able to message a business through WhatsApp, Messenger or Instagram Direct to ask questions, get support, track deliveries and more.

In the future, they will be able to view a business' shop and make purchases right within a chat in WhatsApp, Messenger or Instagram Direct.

Later this year, Facebook will add a new shop tab in the navigation bar, so people can get to Instagram Shop in just one tap.

Facebook said it is making it easier to shop for products in real time.

Soon, sellers, brands and creators will be able to tag products from their Facebook Shop or catalogue before going live and those products will be shown at the bottom of the video so people can easily tap to learn more and purchase.

"We're starting to test this with businesses on Facebook and Instagram, and we'll roll it out more broadly in the coming months," said the company.

Facebook is also working with partners like Shopify, BigCommerce, WooCommerce, ChannelAdvisor, CedCommerce, Cafe24, Tienda Nube and Feedonomics to support small businesses.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.