Galaxy S III bug disables lock screen, grants full access, tests patience (updated)

Galaxy S III bug disables lock screen, grants full access, tests patience

Lock screens are around for a reason: to keep people from getting where they shouldn’t. They aren’t always infallible, though, and a few weeks ago, we saw a vulnerability in several builds of iOS 6 that granted access to the phone module without a passcode. Then, a couple of days ago, we reported on a Galaxy Note II bug that allows the quick-fingered to launch anything immediately behind the lock screen. Now, a similar flaw has been found on the Galaxy S III that breaks the lock screen altogether, permitting full use of the phone. To replicate the bug, you’ll need to tap the “Emergency Call” button on the lock screen, then go into the ICE (emergency contacts) menu. From there, press the home button, followed quickly by the power button, and that’s it. If successful, pressing the power button again will bring up the home screen straight away, and what’s more, the lock screen won’t return until the handset is restarted. Sounds worryingly simple, right? In our experience, not so much.

We first tried this method on an S III running Android 4.0.4 ICS, and a Note II for good measure, but to no avail. Then, we had a crack at an S III running 4.1.2 Jelly Bean, and were close to giving up trying to replicate it when voilà, it worked. We hoped to provide you with a video of the bug, but it must be camera shy. Despite literally hundreds of attempts in front of the lens and several more behind it, we’ve only managed it once — we found it impossible to nail down the correct timing between the home and power button pushes. Samsung’s likely aware of the bug already and when quizzed about the Note II vulnerability, said a fix for lock screen issues on affected “Galaxy devices” was in the works (read: they didn’t say the Note II specifically). We’ve reached out for comment just to be sure, but until a patch is provided, keep your phone concealed from nosey types who read tech sites and have saint-like patience.

Update: Samsung has responded, confirming a fix is indeed on its way:

“Samsung considers user privacy and the security of user data its top priority. We are aware of this issue and will release a fix at the earliest possibility.”

Filed under: , , ,

Comments

Via: SlashGear

Source: Full Disclosure

Samsung Galaxy S III security issue provides lock screen bypass

It all started when Terence Eden discovered a bug that allowed someone to briefly access the home screen on a Galaxy Note II. Following the method to take advantage of the bug, another individual named Sean McMillan discovered another method that allows complete access to the handset’s home screen, and not just for the Galaxy Note II. He reportedly tested the method on three Galaxy S III handsets, and it worked on each of them.

samsung_galaxy_s_III_review_sg_0-580x415

The process, when followed correctly, results in not only the user gaining access to the handset’s home screen without correctly entering the lock screen, but it also removes the needs to enter the pattern, PIN, or other lock method in place once the bypass has been successfully used. Because the bug was replicated on more than one type of Samsung handset, it is possible the issue lies with Samsung’s software rather than with the Android OS.

The folks over at ZDNet say they have confirmed the bugs on both the Galaxy S III and Note II. After what they report was tricky timing issues with getting the method just right, they were able to entirely bypass the lock screen on the Galaxy S III, which was running Android 4.1.2. With the Galaxy Note II, they got the initial bug that provides brief access to the home screen to work, but not the latter method.

If you own one of these two devices and would like to give it a try, the bug is pretty simple. Enter “Emergency Call” from the lock screen and open “Emergency Contacts.” From there, press the Home button, then immediately press the Power button. Press the Power button again, and you’ll be taken to the home screen instead of the lock screen.

[via ZD Net]


Samsung Galaxy S III security issue provides lock screen bypass is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Evernote will implement two-factor authentication soon

Evernote is planning on implementing two-factor authentication with its services soon in light of its recent security blunder. Evernote was hacked over the weekend and its users’ emails, usernames, and passwords were all compromised. The company had to initiate a password reset on all accounts in order to protect its users information. While all of the accounts were compromised, Evernote says that there were no signs of personal notes or account details being accessed

Evernote will implement two-factor authorization in the future

The company stated that it had planned on implementing the two-factor authentication sometime in the future, but because of this security breach, it plans on accelerating the implementation very soon. The authorizations can be delivered in a variety of ways, including SMS messaging, a code delivered via phone call, a one-time code delivered by a smartphone app, or perhaps (and least likely) a code delivered via a hardware token, similar to the Battle.net Authenticator.

Evernote isn’t the first company to be taking advantage of two-factor authentication. Like I mentioned above, Battle.net has its own Authenticator that players can purchase to further protect their accounts. There is also a Battle.net authenticator app available for free on Android and iOS. The authenticator was a security feature added after many player accounts were hacked resulting in many valuable in-game items being lost. Dropbox also implemented a two-factor authentication feature when they had a security breach that compromised all of its users’ emails.

There is no specific date as to when two-factor authentication will find its way to Evernote’s services, but it’s a step in the right direction. Security officials stated that Evernote used the MD5 cryptographic algorithm to hash its passwords, but it turns out that that algorithm is considered to be a terrible choice for security. If they had two-factor authentication, Evernote would still have been hacked, but at least its users’ account information would have been protected.

[via Android Community]


Evernote will implement two-factor authentication soon is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Evernote plans two-factor authentication following last week’s hack

Evernote plans twofactor authentication following last week's hack and password reset

In a move that’s often more reactive than proactive these days, Evernote has shared plans to add two-factor authentication to its login process. This latest announcement follows last week’s hacking attack and subsequent site-wide password reset, and will be available to all of the site’s 50 million users beginning later this year, according to an InformationWeek report. It’s too early to say exactly how the Evernote team plans to implement the new security feature, whether through a dedicated app or text message password, but given the service’s scale, we can likely count out a hardware fob option, at least. For now, your best course of action is to create a secure password, or, if you’re especially paranoid, you may consider delaying your return until the security boost is in place.

Filed under:

Comments

Source: InformationWeek

Galaxy Note II hack exposes homescreen

A security flaw allowing brief – but potentially dangerous – access to the Samsung Galaxy Note II‘s homescreen, even if the phablet has been locked, has been identified, again raising questions about the company’s security policies. The not-quite-a-hack, identified by security researcher Terence Eden, requires nothing more than a few well-timed button presses, and potentially gives – brief – access to whatever apps, widgets, and direct-dial shortcuts are saved on the homescreen.

galaxy_note_ii_homescreen_exploit

The exploit relies on the fact that, when certain buttons are pressed in sequence, the Note II’s homescreen flashes up. That happens no matter whether the phone has been locked with a PIN, pattern lock, password, or Android Face Unlock, and indeed Eden says third-party launchers and lock screens can’t prevent it.

In short, hitting Emergency Call on the homescreen, and then pressing the bottom left “ICE” button, followed by holding down the home button, will prompt the homescreen to show for a short period. What access an attacker might then have depends on what widgets and shortcuts the device’s owner has placed on the homescreen itself: if they’re triggers to call people, for instance, then if tapped before the screen locks again, the call will still go through.

Alternatively, other apps will begin running in the background if tapped in time, or an attacker could simply read through whatever information was being currently shown in a widget. That might be a few recent email inbox entries, or details of the upcoming calendar.

Eden says he alerted Samsung of the exploit’s existence – which he has tested on the UK version of the Galaxy Note II N7100 – several days ago, and yet despite being assured by people close to the company that it had been internally noted, no public response has been given. In the meantime, he recommends removing any homescreen shortcuts that might either cost money if triggered, or give access to sensitive data.

[via Engadget]


Galaxy Note II hack exposes homescreen is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Jailed Hacker Hacks Prison Computers From IT Class

Jailed Hacker Hacks Prison Computers From IT ClassNicholas Webber, who is currently serving five years in jail after creating a hacker’s forum site known as GhostMarket, was invited into an IT class in jail, which is more or less one of the last few places where he should be. Well, what do you in such a situation? The rather modern Isis prison invited him to an IT class, and of course, the inevitable consequence was having the prison’s computer system hacked.

This rather peculiar miscalculation which resulted in the 2011 hacking incident was brought up because the teacher who ran the IT class sued the college which employed him for unfair dismissal. According to Michael Fox, he said that he didn’t know that Webber was a hacker, leaving the prison to ban him, while Kensington and Chelsea College decided to drop him from their payroll. According to the BBC, Isis was “‘bedeviled’ with faulty technology.” Interesting choice of words, would you not say so? It is somewhat akin to letting Joker free into Arkham society, believing that he is “cured” of his murderous madness, if you need something more culturally relevant.

By Ubergizmo. Related articles: Seagate Quits 7200rpm Laptop Hard Drive Market, MSI Unveils AG2712 All-In-One Gaming Rig,

Evernote Hacked

Evernote HackedIt seems that a company is not considered to be “cool” these days if it was not hacked. Evernote has “joined” this “esteemed club” of companies, where their cloud-based services have actually suffered a serious security breach over the weekend. This has caused Evernote to implement a service-wide password reset after attackers managed to gain access to user information.

Good to know that these compromised passwords accessed were “salted hashes”, and in plain English, would be a whole lot harder to crack compared to a plain text password. Some of the other user information that hackers had access to included user IDs as well as e-mail addresses. Having said that, Evernote users were required to reset their respective passwords just in case the attackers managed to recover passwords from the salted hashed list. The password reset will be applicable to all apps that were given access to Evernote accounts, too. Apple, Facebook, Twitter and Microsoft bid Evernote welcome to the hacked club.

By Ubergizmo. Related articles: Raspberry Pi Cake Does Bites Instead Of Bytes, Bing Maps Gets New World Imagery,

Your 3D Printer Could Eat Empty Milk Jugs Instead of Expensive Plastic

Oh 3D printing. You’re so glamorous. You’re so cool. But, let’s be honest, you’re soooo expensive. Maybe instead of printing with $30 spools of plastic you could print with empty shampoo bottles and milk jugs. Oh, you can do that? See, this is why everyone loves you. More »

Evernote issues site-wide password reset after hackers access user details

Evernote issues site-wide password reset after hackers access user details

Popular cross-platform note-storing service Evernote has revealed in a blog post that it has been the subject of hacking attacks. The operations and security team is keen to point out that there is no evidence that any stored notes and content was accessed, but that some user information — including passwords and emails — were. The data breached does benefit from one-way encryption (hashed and salted), but the firm is issuing a site-wide password reset just in case. In short, all users of the site will be required to set a new password, and are advised to log-in as soon as possible to do so. For more details and updates, we suggest keeping a close eye on Evernote’s official blog and twitter. Both of which can be found below.

Filed under:

Comments

Source: Evernote Blog, Evernote (Twitter)

Evernote hacked: Emails, encrypted passwords stolen

Cloud notetaking service Evernote has been hacked, the company has revealed today, with an unidentified attacker compromising servers and extracting usernames, email addresses, and encrypted passwords. The attack has forced a mandatory password reset, meaning all users must change their password before they can log back into their account, but Evernote says there is no evidence of either notes being viewed by a third-party, or payment details of Evernote Premium or Business users being accessed.

evernote-580x390

Evernote has begun to notify all users by email of the breach, though the company is confident that data itself is safe. “The passwords stored by Evernote are protected by one-way encryption” Evernote said, “in technical terms, they are hashed and salted.”

“On February 28th, the Evernote Operations & Security team became aware of unusual and potentially malicious activity on the Evernote service that warranted a deeper look. We discovered that a person or persons had gained access to usernames, email addresses and encrypted user passwords. In our ongoing analysis, we have found no evidence that there has been unauthorized access to the contents of any user account or to any payment information of Evernote Premium and Evernote Business customers” Evernote spokesperson

Exactly how the hack took place has not been revealed, though Evernote says its Operations & Security team is still investigating. However, it’s believed to be “a coordinated attempt” to steal, change, or delete user-data.

Evernote insists that its “password encryption measures are robust” but says also that it is “taking additional steps” to bolster security, of which forcing a password change is part of it. The company also suggests people choose more complex passwords, avoiding dictionary words, and don’t use the same password across multiple sites or services.


Evernote hacked: Emails, encrypted passwords stolen is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.