Samsung Galaxy S5 Fingerprint Scanner Already Hacked!

It might have taken some extra time, but Samsung quickly adopted biometric security on their new S5 flagship Android phone. However, it didn’t take hackers long to figure out a way to defeat it.

samsung fingerprint scanner s5 620x392magnify

Apparently, the fingerprint scanner of the S5 isn’t hard to spoof. SRLabs have been able to spoof it using a lifted print. It took them only a few minutes to create a dummy finger to allow them access to the phone. This is also true of the scanner on the iPhone 5s, however the iPhone 5s has got a password to allow access to the scanner, which the Galaxy S5 doesn’t have yet.

Hopefully, a quick software update will patch this vulnerability. PayPal has already reacted with a statement, saying that there are plenty of additional safeguards that will allow users peace of mind when using biometric security. With any luck, your money is still safe.

[via BGR]

Google patches Android icon permissions flaw

Security vendor FireEye has announced that Google has issued a patch for a security flaw that left Android users vulnerable to attacks that could lead them to phishing sites. The … Continue reading

How to Check If Your Android Device Could Be Hacked via Heartbleed

How to Check If Your Android Device Could Be Hacked via Heartbleed

Heartbleed is causing heartache on hundreds of servers all over the internet, but security researchers have also warned that the bug could allow direct hacks of Android, too. Here’s how to check if your device is at risk.

Read more…




Try the Super-Secure USB Drive OS That Edward Snowden Insists on Using

Try the Super-Secure USB Drive OS That Edward Snowden Insists on Using

We all know that Edward Snowden insists on secure email , but he’s also very picky about his operating systems, too. In fact, he uses a free, super-secure version of Linux—called Tails—that fits on a USB stick and can be used on any computer without leaving a trace.

Read more…




Google Terms of Service updated with email scanning notice

In light of a recent legal spat, Google has updated its Terms of Service to notify Gmail users of automatic email analysis. The purpose is for targeting advertisements to the … Continue reading

NSA details Heartbleed “mitigations” in new report

Amidst the Heartbleed bug hoopla this month was a claim the NSA knew about and actively exploited the vulnerability, something the agency soon denied. Apparently in line with that claim, … Continue reading

Google Glass Privacy App Spots Security Cameras & Other Glass Users: Soliton Radar

Modern stealth action video games like the Metal Gear Solid series and the new Deus Ex often have a radar feature that lets you see enemies and cameras, among other things. New media artist Sander Veenhof made a similar app for Google Glass. He calls it Watch Your Privacy, and it uses open data to locate nearby surveillance cameras. That includes the mobile kind, i.e. other Glass users.

google glass watch your privacy app by Sander Veenhofmagnify

Watch Your Privacy uses a database of surveillance cameras called OSMcamera. Sander didn’t elaborate how his app spots other Glass users, just that it maps “the latitute/longitude coordinates of each Google Glass user.”

google glass watch your privacy app by Sander Veenhof 2 620x345magnify

The app marks both cameras and users with a triangular warning sign along with a number, their distance from you and their coordinates. In addition, it marks the approximate coverage area of surveillance cameras. You can either have the area appear mark them as non-safe (red) or safe zones (green). If you want to stay hidden like Solid Snake, you’ll want to mark those areas red. If you feel more comfortable in a place with security cameras then you’ll mark their coverage areas green.

Glass users, crawl to your browser and head to Sander’s website to download his app.

[via Prosthetic Knowledge]

NYT: Obama Lets the NSA Exploit Some Internet Flaws

NYT: Obama Lets the NSA Exploit Some Internet Flaws

Over the weekend, it was revealed that President Obama thinks that when the National Security Agency discovers major flaws in Internet security, they should be allowed to exploit it if there’s a "a clear national security or law enforcement need."

Read more…




Cybersecurity As A War Against Haunted Objects

Cybersecurity As A War Against Haunted Objects

We’ve already covered the insane case of a Chinese restaurant menu that served as a successful point of infiltration for hackers to access the private computers of an unnamed oil company, so I won’t go into much more detail. However, there was a brief moment in the original New York Times story that deserves a quick shoutout here.

Read more…




Obama: NSA to expose not exploit bugs like Heartbleed

Potentially catastrophic internet security exploits like Heartbleed should be publicized rather than covertly used for surveillance, President Obama has reportedly told the NSA and other intelligence divisions, although exceptions to … Continue reading