• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 20th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security

Security Flaw in Samsung Galaxy S5 Allows Hackers to Steal Your Fingerprint

April 25th, 2015 Waqas Security 0 comments
Security Flaw in Samsung Galaxy S5 Allows Hackers to Steal Your Fingerprint
Share on FacebookShare on Twitter

Security flaw in Android version 5.0 and below makes it possible for hackers to take fingerprint copies and unlock Samsung Galaxy S5. This could lead to obtaining and exploitation of victim’s personal data.

FireEye experts Yulong Zhang and Tao Wei have exposed a critical Android flaw, which makes Samsung Galaxy S5 smartphone highly vulnerable to attacks.

Experts revealed that hackers can easily obtain fingerprint data and steal personal info, thanks to the flaw and use personal data for malicious purposes.

  • Must Read: How to use Google Search to locate your lost Android Smartphone or Tablet

samsung-galaxy-s5-security-flaw-steal-fingerprint-2
Mr Zhang and Mr Wei identified that due to the flaw it was possible to gather identification data prior to the phone getting locked in a secure region.

Researchers explain that fingerprint locks’ oriented phones are manufactured in a way that attackers don’t need deep access to the phone. Just accessing the device’s memory can expose finger scan data.

The acquired data can help attacker create a fake lock screen making the victims believe that they are just swiping their finger to unlock phone. However, in reality they are actually making a transaction.

The vulnerability also allows attackers to upload their own fingerprint data because devices like Samsung Galaxy S5 never keep records of the number of prints.

According to Zhang and Wei, the flaw not only affects Samsung phone but all Android smartphones may be vulnerable.

They will be presenting their findings on 24th April, at the RSA security conference, San Francisco.

According to Mr. Zhang, their findings are most likely to spread across handsets running Android 5.0 or lower versions.

Zhang told Forbes that he also identified that if users upgrade to Android version 5.1.1, they it is possible to remove the vulnerability.

Samsung states that the company was investigating the findings of FireEye experts and it takes security related issues “very seriously.”

Source: RSA Conference
Image via: 
WhoTrades

Follow @HackRead

  • Tags
  • Android
  • Fingerprint
  • Privacy
  • RSA Conference
  • Samsung Galaxy S5
  • security
  • Smartphone
  • Unlocking
Facebook Twitter LinkedIn Pinterest
Previous article Cyberwar: Armenian, Turkish hackers targeting each other's govt websites
Next article Report reveals 1 in every 5 Android Apps is Malware
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Malwarebytes says it was also breached by SolarWinds hackers

Malwarebytes says it was also breached by SolarWinds hackers

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

22
Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping
Security

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

47
Malwarebytes says it was also breached by SolarWinds hackers
Hacking News

Malwarebytes says it was also breached by SolarWinds hackers

60

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us