Samsung’s Galaxy S5 smartphone has already had its fingerprint scanner hacked, as questions remain over the effectiveness of biometrics for device security.
Apple’s iPhone 5S Touch ID tool was hacked within a few weeks of being launched, as the hacker community looks for ways to spoof the system. Now, ethical hackers with Security Research Labs have demonstrated how to beat the Galaxy S5.
In a video posted to YouTube – embedded below – they show how a print of the fingerprint registered to a device is adequate for unlocking the device.
The researchers also chided Samsung for making it possible to have unlimited attempts to use a fingerprint to log in to the device, rather than requesting a passcode after a certain number of attempts.
“Perhaps most concerning is that Samsung does not seem to have learned from what others have done less poorly," the researcher in the video said.
"Not only is it possible to spoof the fingerprint authentication even after the device has been turned off, but the implementation also allows for seemingly unlimited authentication attempts without ever requiring a password."
The Samsung Galaxy S5 hit the market last week for a not inconsiderable £579. Samsung has touted the fingerprint scanner and the inclusion of its latest Knox Security tools as proof the device is suitable for the business market.
However, the hack of the fingerprint scanner could concern some and suggest that the use of a passcode remains a simpler but more secure method of protection.
BT wants to make the public switched telephone network history within eight years
Personal data being purloined by third parties via Facebook Login API
MacOS and iOS are better off apart, says CEO Tim Cook
Or they'll no longer be entitled to updates and bug patches