Samsung’s Galaxy S5 smartphone has already had its fingerprint scanner hacked, as questions remain over the effectiveness of biometrics for device security.
Apple’s iPhone 5S Touch ID tool was hacked within a few weeks of being launched, as the hacker community looks for ways to spoof the system. Now, ethical hackers with Security Research Labs have demonstrated how to beat the Galaxy S5.
In a video posted to YouTube – embedded below – they show how a print of the fingerprint registered to a device is adequate for unlocking the device.
The researchers also chided Samsung for making it possible to have unlimited attempts to use a fingerprint to log in to the device, rather than requesting a passcode after a certain number of attempts.
“Perhaps most concerning is that Samsung does not seem to have learned from what others have done less poorly," the researcher in the video said.
"Not only is it possible to spoof the fingerprint authentication even after the device has been turned off, but the implementation also allows for seemingly unlimited authentication attempts without ever requiring a password."
The Samsung Galaxy S5 hit the market last week for a not inconsiderable £579. Samsung has touted the fingerprint scanner and the inclusion of its latest Knox Security tools as proof the device is suitable for the business market.
However, the hack of the fingerprint scanner could concern some and suggest that the use of a passcode remains a simpler but more secure method of protection.
HP ZBook x2 offers 32GB RAM, M.2 SSD with up to 2TB storage and Nvidia Quadro GPU
Laptops should be able to offer true all-day working, and some
CGN has created an "online capability gap" between cyber criminals and law enforcement, says Europol
ISPs use Carrier Grade NAT to share IP addresses amongst multiple users
Attack revealed bugs and potential security flaws that were later exploited in real-world cyber attacks