weareliferuiner

  • Home
  • TECH
    • APP
    • APP REVIEW
    • GADGETS
    • IOS
    • MAC
    • SMARTPHONE
  • COMMUNICATION
  • LIFESTYLE
    • BEAUTY
    • FAMILY
    • FESTIVAL
    • FITNESS
    • FOOD & DRINK
    • HEALTH
  • MONEY
  • Chocolate
  • PRODUCTIVITY
  • NEWS
  • Contact Us !
Reading: Can the Samsung Galaxy S5 Let Hackers Steal Your Fingerprint?
Share
Aa
Aa
weareliferuinerweareliferuiner
Search
  • Home
  • TECH
    • APP
    • APP REVIEW
    • GADGETS
    • IOS
    • MAC
    • SMARTPHONE
  • COMMUNICATION
  • LIFESTYLE
    • BEAUTY
    • FAMILY
    • FESTIVAL
    • FITNESS
    • FOOD & DRINK
    • HEALTH
  • MONEY
  • Chocolate
  • PRODUCTIVITY
  • NEWS
  • Contact Us !
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
weareliferuiner > TECH > Can the Samsung Galaxy S5 Let Hackers Steal Your Fingerprint?
TECH

Can the Samsung Galaxy S5 Let Hackers Steal Your Fingerprint?

sristy
Last updated: 2017/01/03 at 4:44 AM
By sristy 3 Min Read
Share
SHARE

Your fingerprint is unique to you.

The fingerprint scanner for added security on your smartphone makes sense, right?

Unfortunately, it looks like that added security might be more of a liability. Researchers claim a flaw found in certain Android devices could let hackers clone your fingerprint authentication and use it for additional cyberattacks and potential theft.

Tao Wei and Yulong Zhang from the security firm FireEye claim they have found failures in the security of fingerprint authentication for the Samsung Galaxy S5 and other Android devices. The duo have recently presented (PDF) their findings at the RSA Conference.

Essentially, the problem breaks down to this:

  • Information on these smartphones is being segmented and encrypted in separate secure zones.
  • The flaw is that attackers can grab your fingerprint information before it reaches the protected zone, or TrustZone as Wei and Zhang call it.
  • From there, fingerprint data can be copied and stored.

This means that attackers don’t have to try and break into the TrustZone. Instead, information is stolen from memory or storage. Attackers just have to manage user-level access and your fingerprint is theirs. The problem appears to be even worse on the Galaxy S5, where malware only needs system-level access.

Zhang told Forbes:

“If the attacker can break the kernel [the core of the Android operating system], although he cannot access the fingerprint data stored in the trusted zone, he can directly read the fingerprint sensor at any time. Every time you touch the fingerprint sensor, the attacker can steal your fingerprint … You can get the data and from the data you can generate the image of your fingerprint. After that you can do whatever you want.”

This problem seems to be only present on devices running operating systems older than Android 5.0 Lollipop. Wei and Zhang suggest anyone using an older version should update their devices if possible.

A Samsung spokesperson told Forbes via email:

“Samsung takes consumer privacy and data security very seriously. We are currently investigating FireEye’s claims.”

Wei and Zhang said they have not tested any other devices but they speculate the problem may be widespread. They suggest taking precautions to protect your information. Keep your device updated, only install apps from popular and reliable sources, and stick to mobile device vendors with timely patches and upgrades. They have also suggested that enterprise users might want to seek professional services to get protection from advanced target attacks.

Fingerprints Photo via Shutterstock

[“source-smallbiztrends”]

TAGGED: Can, Fingerprint, Galaxy, Hackers, Let, S5, Samsung, Steal, the, your
sristy January 3, 2017
Previous Article Samsung Earnings Are Rebounding as Flurry of New Biz Tech Appears
Next Article 10 Most Important Things to Know About Using Apple Pay

Latest News

Explore Asian & Pacific Islander Heritage with Google
PRODUCTIVITY
How to Surprise Mom on Mother’s Day: 12 Unique Ideas
Chocolate
Educating Your Children About the Value of Family
FAMILY
Essential Steps for Prime Contractors to Enforce CMMC Compliance Requirements Across Their Supply Chain
NEWS
The Top 20 Fitness Blogs
FITNESS
The system for cheap chocolate
Chocolate
FREE TECHNICAL ADVICE, SUPPORT, AND LESSONS
GADGETS
Troubleshooting Chocolate Tempering
Chocolate

Removed from reading list

Undo

Lost your password?