Source: National Cyber Security – Produced By Gregory Evans
According to one of their recent discoveries, there’s a bug that affects 21 percent of Android devices in use and it basically allows anyone to unlock your password-protected device by bypassing the lock screen with an extremely lengthy password. In August, it committed a patch to resolve the issue and on September 9th, announced that the 5.1.1 build LMY48M had fixed the issue. After inserting the long string into the window, the hacker then open the camera from the locked device and swipes down for more options menu and pastes the characters in the resulting password prompt. Copy and paste a lengthy string into the password field, and it is possible to crash the lockscreen and gain access to the phone or tablet. Once Android restores itself after the crash, an attacker should have access to the device’s normal home screen. You can see the step by step guide over on the University of Texas security blog, and check out the proof of concept video below. Just replace your password with a PIN, pattern lock, or fingerprint unlock, and you should be fine. The same build number handled the Stagefright vulnerability in Android devices. After the attack the hacker then […]
For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com
The post Simply lengthy wrong passwords bypass Android 5.x lockscreen; PIN & Pattern Safe appeared first on National Cyber Security.
View full post on National Cyber Security