{"id":208,"date":"2013-03-20T17:30:58","date_gmt":"2013-03-20T17:30:58","guid":{"rendered":"https:\/\/backgroundpropaganda.com\/wp\/?p=208"},"modified":"2023-12-01T19:04:22","modified_gmt":"2023-12-01T19:04:22","slug":"yet-another-samsung-lockscreen-hack-identified","status":"publish","type":"post","link":"https:\/\/backgroundpropaganda.com\/wp\/?p=208","title":{"rendered":"Yet another Samsung lockscreen hack identified"},"content":{"rendered":"<p>A new Samsung lockscreen hack <a href=\"http:\/\/shkspr.mobi\/blog\/2013\/03\/new-bypass-samsung-lockscreen-total-control\/\">has been identified<\/a>, allowing unofficial access to PIN-secured Galaxy smartphones through a combination of keypresses and commands, though Samsung is apparently working on a software fix. The exploit relies on brief visibility of the phone\u2019s display, unlocked, after a failed emergency call placed from the lockscreen; though ponderous, you could use that access to download a screenlock disabler from the Google Play store.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"galaxy_note_ii\" src=\"http:\/\/cdn.slashgear.com\/wp-content\/uploads\/2013\/03\/galaxy_note_ii.jpeg\" width=\"580\" height=\"386\"><\/p>\n<p><span><\/span><\/p>\n<p>The flaw was identified by Terrence Eden, who has something of a track record for spotting Samsung exploits. Earlier this month he found ways to bypass the lockscreen security <a href=\"http:\/\/www.slashgear.com\/galaxy-note-ii-hack-exposes-homescreen-04272378\/\">on the Galaxy Note II<\/a>, a hack which then prompted another researcher to come forward with a second hack, <a href=\"http:\/\/www.slashgear.com\/samsung-galaxy-s-iii-security-issue-provides-lock-screen-bypass-05272747\/\">this time for the Galaxy S III<\/a>.<\/p>\n<p>Eden\u2019s latest discovery only allows for a brief period of interaction with the momentarily-unlocked phone at a time, but given sufficient access to repeat the process, it could allow for calls to be placed, apps downloaded, data viewed, or other illicit use to be made of the handset.<\/p>\n<\/p>\n<p><center><iframe loading=\"lazy\" title=\"YouTube video player\" width=\"584\" height=\"362\" src=\"http:\/\/www.youtube.com\/embed\/YEsdHs0-W-Y\" frameborder=\"0\"><\/iframe><\/center><\/p>\n<p>Eden says that he\u2019s been in communication with Samsung around the issue, and that the company will have a patch to address the loophole that it intends to release \u201cshortly.\u201d He also offered to withhold an announcement of the exploit until that happened, something Eden says Samsung declined.<\/p>\n<p>Until it\u2019s patched, however, there\u2019s no way to avoid the problem, bar removing Samsung\u2019s ROM and replacing it with a more standard Android installation. As ever, be careful who you leave your phone with.<\/p>\n<div>\n<div>\n<h4>Story Timeline<\/h4>\n<ul>\n<li><a href=\"http:\/\/www.slashgear.com\/galaxy-note-ii-hack-exposes-homescreen-04272378\/\">Galaxy Note II hack exposes homescreen<\/a><\/li>\n<li><a href=\"http:\/\/www.slashgear.com\/samsung-galaxy-s-iii-security-issue-provides-lock-screen-bypass-05272747\/\">Samsung Galaxy S III security issue provides lock screen bypass<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p><small><br \/><a href=\"http:\/\/www.slashgear.com\/yet-another-samsung-lockscreen-hack-identified-20274726\/\" title=\"Yet another Samsung lockscreen hack identified\">Yet another Samsung lockscreen hack identified<\/a> is written by <a href=\"http:\/\/twitter.com\/c_davies\">Chris Davies<\/a> &amp; originally posted on <a href=\"http:\/\/www.slashgear.com\" title=\"SlashGear\">SlashGear<\/a>. <br \/>\u00a9 2005 &#8211; 2012, <a href=\"http:\/\/www.slashgear.com\" title=\"SlashGear\">SlashGear<\/a>. All right reserved. <\/small><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/slashgear\/~4\/3K9qvp6A91c\" height=\"1\" width=\"1\"><\/p>\n<p>SOURCE <a href=\"http:\/\/www.slashgear.com\/yet-another-samsung-lockscreen-hack-identified-20274726\/?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+slashgear+%28SlashGear%29\">SlashGear<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new Samsung lockscreen hack has been identified, allowing unofficial access to PIN-secured Galaxy smartphones through a combination of keypresses and commands, though Samsung is apparently working on a software fix. The exploit relies on brief visibility of the phone\u2019s display, unlocked, after a failed emergency call placed from the lockscreen; though ponderous, you could &#8230; <a href=\"https:\/\/backgroundpropaganda.com\/wp\/?p=208\">Continue Reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-208","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=208"}],"version-history":[{"count":1,"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/208\/revisions"}],"predecessor-version":[{"id":313,"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/208\/revisions\/313"}],"wp:attachment":[{"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/backgroundpropaganda.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}