Samsung Galaxy S III bug lets anyone bypass password-protected lockscreen

[email protected] (Anupam Saxena)
March 8, 2013

Samsung_Galaxy_S_III

A user has discovered a security flaw in the Samsung Galaxy S III that allows anyone to bypass the lock screen of the phone by following a few simple steps.

Sean McMillan has posted a method to access the lock screen of the Galaxy S II on a mailing list. According to him the bug can be reproduced by following these steps:

1) On the code entry screen (of the lock screen) press Emergency Call

2) Then press Emergency Contacts

3) Press the Home button once

4) Just after pressing the Home button, press the power button quickly

5) If successful, pressing the power button again will bring you to the S3's home screen

McMillan mentions that it might take a few attempts to get the hack working and that sometimes the method works in one go while at others, it can take more than 20 attempts. He also adds that the method seems to work better when the mobile has auto rotation turned on. McMillan claims to have tested the method on three Galaxy S III devices.

We tried unlocking the screen of a Samsung Galaxy S III(GT-I9300 running Android 4.1.2) using the same method but weren't successful.

However, ZDNET says they were able to replicate the hack after a few attempts. The site states that the timing to replicate the issue is very small and that it is difficult to replicate it in the first attempt. But after bypassing the screen once, the bug stays on the device even when the phone's screen is turned back off and the phone stops asking the user for their PIN, password or pattern.

Just a few days back, another user, Terence Eden, had discovered a security flaw in the Samsung Galaxy Note II that allowed anyone to bypass the lock screen and take a look at the home screen app icons by following similar steps. But the hack didn't allow the hacker to use any of the apps.

Last month, a similar vulnerability was discovered in Apple iOS 6.1, allowing users to bypass the lock screen, following which Apple had acknowledged the issue and promised a fix.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 13,2020

New Delhi, Jul 13: The Income Tax Department has facilitated a new functionality for banks and post offices to ascertain TDS applicability rates on cash withdrawal of above Rs 20 lakh in case of a non-filer of the income-tax return and that of above Rs 1 crore in case of a filer of the income-tax return.

In a statement, the Central Board of Direct Taxes (CBDT) said that now banks and post offices have to only enter the PAN of the person who is withdrawing cash for ascertaining the applicable rate of TDS.

So far, more than 53,000 verification requests have been executed successfully on this facility, a statement by the CBDT said.

"CBDT today said that this functionality available as 'Verification of applicability u/s 194N' on www.incometaxindiaefiling.gov.in since 1st July 2020, is also made available to the Banks through web-services so that the entire process can be automated and be linked to the Bank's internal core banking solution," it said.

On entering PAN by the bank or the post office, a message will be instantly displayed on the departmental utility: "TDS is deductible at the rate of 2 per cent if cash withdrawal exceeds Rs 1 crore", in case the person withdrawing cash is a filer of the income-tax return.

In case the person withdrawing cash is a non-filer of income tax return, the message shown would be: "TDS is deductible at the rate of 2 per cent if cash withdrawal exceeds Rs 20 lakh and at the rate of 5 per cent if it exceeds Rs 1 crore."

The CBDT said that the data on cash withdrawal indicated that huge amount of cash is withdrawn by the persons who have never filed income-tax returns.

To ensure filing of return by these persons and to keep track on cash withdrawals by the non-filers, and to curb black money, the Finance Act, 2020 with effect from July 1, 2020 further amended IT Act to lower threshold of cash withdrawal to Rs 20 lakh for the applicability of this TDS for the non-filers and also mandated TDS at the higher rate of 5 per cent on cash withdrawal exceeding Rs 1 crore by the non-filers.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 21,2020

The World Health Organisation (WHO) on Saturday launched a Health Alert on WhatsApp where over 1.5 billion users can ask questions and they will be provided with reliable information about new coronavirus 24/7.

This will also serve government decision-makers by providing the latest numbers and situation reports, WhatsApp said in a statement.

To contact the WHO Health Alert, save the number +41 79 893 1892 in phone contacts, and then simply text the word 'Hi' in a WhatsApp message to get started.

The service responds to a series of prompts and will be updated daily with the latest information.

"You can also visit the WhatsApp Coronavirus Information Hub at whatsapp.com/coronavirus," and click on the WHO link on the homepage to open up a chat with the WHO Health Alert if you have WhatsApp installed," said the micro-blogging platform.

The WHO Health Alert will provide official information on topics such as how to protect yourself from infection, travel advice, and debunking new coronavirus myths.

The service is initially launching in English but will be available in all six languages within the coming weeks (English, Arabic, Chinese, French, Russian and Spanish.)

"Digital technology gives us an unprecedented opportunity for vital health information to go viral and spread faster than the pandemic. We are proud to have partners like Facebook and WhatsApp, that are supporting us in reaching billions of people with important health information," said Dr Tedros Adhanom Ghebreyesus, Director-General of the WHO.

The WHO Health Alert is the latest official NGO or government helpline to become available on WhatsApp, joining the Singapore Government, The Israel Ministry of Health, the South Africa Department of Health, and KOMINFO Indonesia.

Earlier this week, WhatsApp, in partnership with the World Health Organization, UNICEF, and UNDP, launched the WhatsApp Coronavirus Information Hub. The hub offers general tips and resources for users around the world to reduce the spread of rumours and connect with accurate health information.

WhatsApp also announced a $1 million grant to the International Fact Checking Network to support fact-checking for the #CoronaVirusFacts Alliance.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.