Samsung Galaxy S III bug lets anyone bypass password-protected lockscreen

[email protected] (Anupam Saxena)
March 8, 2013

Samsung_Galaxy_S_III

A user has discovered a security flaw in the Samsung Galaxy S III that allows anyone to bypass the lock screen of the phone by following a few simple steps.

Sean McMillan has posted a method to access the lock screen of the Galaxy S II on a mailing list. According to him the bug can be reproduced by following these steps:

1) On the code entry screen (of the lock screen) press Emergency Call

2) Then press Emergency Contacts

3) Press the Home button once

4) Just after pressing the Home button, press the power button quickly

5) If successful, pressing the power button again will bring you to the S3's home screen

McMillan mentions that it might take a few attempts to get the hack working and that sometimes the method works in one go while at others, it can take more than 20 attempts. He also adds that the method seems to work better when the mobile has auto rotation turned on. McMillan claims to have tested the method on three Galaxy S III devices.

We tried unlocking the screen of a Samsung Galaxy S III(GT-I9300 running Android 4.1.2) using the same method but weren't successful.

However, ZDNET says they were able to replicate the hack after a few attempts. The site states that the timing to replicate the issue is very small and that it is difficult to replicate it in the first attempt. But after bypassing the screen once, the bug stays on the device even when the phone's screen is turned back off and the phone stops asking the user for their PIN, password or pattern.

Just a few days back, another user, Terence Eden, had discovered a security flaw in the Samsung Galaxy Note II that allowed anyone to bypass the lock screen and take a look at the home screen app icons by following similar steps. But the hack didn't allow the hacker to use any of the apps.

Last month, a similar vulnerability was discovered in Apple iOS 6.1, allowing users to bypass the lock screen, following which Apple had acknowledged the issue and promised a fix.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 19,2020

New Delhi, Jul 19: Three of the 10 most valued companies added a total of Rs 98,622.89 crore to their market valuation last week, led by stellar gains in IT major Infosys.

Seven companies from the coveted list witnessed a decline in their market valuation last week, but their cumulative loss of Rs 37,701.1 crore was less than the total gain made by three firms -- Reliance Industries Limited, Hindustan Unilever Limited and Infosys.

The market capitalisation of Infosys zoomed Rs 52,046.87 crore to Rs 3,85,027.58 crore. Shares of Infosys had rallied over 9 per cent on Thursday after the company posted a stronger-than-expected 12.4 per cent rise in the first quarter consolidated net profit.

Hindustan Unilever Limited added Rs 25,751.07 crore in its market valuation which stood at Rs 5,48,232.26 crore at close on Friday. Reliance Industries' m-cap jumped Rs 20,824.95 crore to Rs 12,11,682.08 crore.

In contrast, HDFC's valuation plunged Rs 13,920.21 crore to Rs 3,13,269.70 crore and that of Tata Consultancy Services (TCS) declined Rs 7,617.34 crore to Rs 8,26,031.21 crore.

The valuation of ICICI Bank tumbled Rs 4,205.71 crore to Rs 2,29,156.24 crore and that of Kotak Mahindra Bank by Rs 4,175.28 crore to Rs 2,62,864.37 crore.

Bharti Airtel's m-cap dipped Rs 4,009.83 crore to Rs 3,09,521.05 crore and HDFC Bank's by Rs 3,403.97 crore to Rs 6,03,463.97 crore.

The valuation of ITC declined by Rs 368.76 crore to Rs 2,38,469.29 crore.

In the ranking of top-10 firms, RIL was at the number one rank followed by TCS, HDFC Bank, HUL, Infosys, HDFC, Bharti Airtel, Kotak Mahindra Bank, ITC and ICICI Bank.

During the last week, the 30-share BSE index advanced 425.81 points or 1.16 per cent.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 18,2020

Beijing, Jun 18:  Besides washing hands and wearing masks, it is also important to close the toilet lid before flushing to contain the spread of COVID-19, as per a new study.

According to a new study cited by The Washington Post, scientists who simulated toilet water and airflows, have found that flushing a toilet can generate a plume of virus-containing aerosol particles that is widespread and can linger in the air long enough to be inhaled by others. The novel coronavirus has been found in the faeces of COVID-19 patients, but it remains unknown whether such clouds could contain enough virus to infect a person.

"Flushing will lift the virus up from the toilet bowl," co-author Ji-Xiang Wang, who researches fluids at Yangzhou University in Yangzhou, China, said in an email. Wang stressed that bathroom users "need to close the lid first and then trigger the flushing process" and wash hands properly if the closure is not possible. As one flushes the toilet with the lids open, bits of faecal matter swish around so violently that they can be propelled into the air, become aerosolised and then settle on the surroundings.

Experts call it the "toilet plume".Age-old studies have been made to understand the potential for airborne transmission of infectious disease via sewage, and the toilet plume's role. Scientists who have seeded toilet bowls with bacteria and viruses have found contamination of seats, flush handles, bathroom floors and nearby surfaces. This is one reason we are told to wash our hands after visiting the toilet. Public bathrooms are well known to contribute to the spread of viruses that transmit via ingestion, such as the noroviruses that haunt cruise ships. However, their role in the transmission of respiratory viruses has not been established, said Charles P Gerba, a microbiologist at the University of Arizona."The risk is not zero, but how great a risk it is, we do not know. The big unknown is how much virus is infectious in the toilet when you flush it ... and how much virus does it take to cause an infection," said Gerba, who has studied the intersection of toilets and infectious disease for 45 years.

A study published in March in the journal Gastroenterology found significant amounts of coronavirus in the stool of patients and determined that viral RNA lasted in faeces even after the virus cleared from the patients` respiratory tracts. While another study in the journal Lancet found coronavirus in faeces up to a month after the illness had passed.

Scientists around the world are now studying sewage to track the spread of the virus. According to the researchers, the presence of the virus in excrement and the gastrointestinal tract raises the prospect of transmission via toilets, because many COVID-19 patients experience diarrhoea or vomiting.

A study of air samples in two hospitals in Wuhan, China found that although coronavirus aerosols in isolation wards and ventilated patient rooms were very low, "it was higher in the toilet areas used by the patients".The Centers for Disease Control and Prevention (CDC) says it remains "unclear whether the virus found in faeces may be capable of causing COVID-19," and "there has not been any confirmed report of the virus spreading from faeces to a person".For now, the CDC characterises the risk as low based on observations from previous outbreaks of other coronaviruses such as severe acute respiratory syndrome (SARS) and the Middle East respiratory syndrome (MERS). Wang decided to use computer models to simulate toilet plumes while isolating at home, as per Chinese government orders and thinking about how a fluids researcher "could contribute to the global fight against the virus".

Published in the journal Physics of Fluids, the study found that flushing of both single-inlet toilets, which push water into the bowl from one port, and annular-inlet toilets, which pour water into the bowl from the rim's surrounding edge with even greater energy, results in "massive upward transport of virus".

Particles can reach heights of more than three feet and float in the air for more than a minute, it found. The paper recommends not just lid-closing and hand-washing, it urges manufacturers to produce toilets that close and self-clean automatically. It also suggests that toilet-users should wipe down the seat. Gerba, however, said seats should not be a major concern.

Research has found that public and household toilet seats are typically the cleanest surfaces in restrooms, he said, probably because so many people already wipe them off before using them. Also, he said of SARS-CoV-2, the virus that causes COVID-19, "I don't think it's butt-borne, so I don`t think you have to worry."Gerba, who has been studying coronavirus transmission for two decades to investigate the role of a toilet flushing in a SARS outbreak stresses "flush and run" when using a public toilet without a lid. Gerba also said that people should wash hands well post-flushing and use hand sanitiser after leaving the restroom. "Choose well-ventilated bathrooms if possible and do not hang around the restroom in any case," added Gerba.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 3,2020

Giving each and every app access to personal information stored on Android smartphones such as your contacts, call history, SMS and photos may put you in trouble as bad actors can easily use these access to spy on you, send spam messages and make calls anywhere at your expense or even sign you up for a premium "service", researchers from cybersecurity firm Kaspersky have warned.

But one can restrict access to such information as Android lets you configure app permissions. 

Giving an app any of these permissions generally means that from now on it can obtain information of this type and upload it to the Cloud without asking your explicit consent for whatever it intends to do with your data.

Therefore, security researchers recommend one should think twice before granting permissions to apps, especially if they are not needed for the app to work. 

For example, most games have no need to access your contacts or camera, messengers do not really need to know your location, and some trendy filter for the camera can probably survive without your call history, Kaspersky said. 

While decision to give permission is yours, the fewer access you hand out, the more intact your data will be.

Here's what you should know to protect your data.

SMS: An app with permission to send and receive SMS, MMS, and WAP (Wireless Application Protocol) push messages, as well as view messages in the smartphone memory will be able to read all of your SMS correspondence, including messages with one-time codes for online banking and confirming transactions.

Using this permission, the app can also send spam messages in your name (and at your expense) to all your friends. Or sign you up for a premium "service." You can see and conrol which apps have these rights by going to the settings of your phone.

Calendar: With permission to view, delete, modify, and add events in the calendar, prying eyes can find out what you have done and what you are doing today and in the future. Spyware loves this permission.

Camera: Permission to access the camera is necessary for the app to take photos and record video. But apps with this permission can take a photo or record a video at any moment and without warning. Attackers armed with embarrassing images and other dirt on you can make life a misery, according to Kaspersky.

Contacts: With permission to read, change, and add contacts in your address book, and access the list of accounts registered in the smartphone, an app can send your entire address book to its server. Even legitimate services have been found to abuse this permission, never mind scammers and spammers, for whom it is a windfall.

This permission also grants access to the list of app accounts on the device, including Google, Facebook, and many other services.

Phone: Giving access to your phone means permission to view and modify call history, obtain your phone number, cellular network data, and the status of outgoing calls, add voicemail, access IP telephony services, view numbers being called with the ability to end the call or redirect it to another number and call any number.

This permission basically lets the app do anything it likes with voice communication. It can find out who you called and when or prevent you from making calls (to a particular number or in general) by constantly terminating calls. 

It can eavesdrop on your conversations or, of course, make calls anywhere at your expense, including to pay-through-the-nose numbers, Kaspersky warned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.