Hackers Fool iPhone 5S Fingerprint Scanner
Apple's new fingerprint security system for the iPhone 5S was supposed to make it harder for hackers to access a user's personal information. However, it appears hackers in Germany have already found a way to dupe the system.
Germany's Chaos Computer Club (CCC) hacking group recently unveiled a strategy for beating the iPhone 5S' fingerprint authentication.
The trick: using a customized print out of a victim's fingerprint.
Victim Fingerprint, Common Home Tools All That's Required
Here's how the trick works: first, a hacker must acquire a high-quality photograph of a victim's fingerprint. Next, they must invert the image and print it using a laser printer with a "thick toner setting". (Source: pcworld.com)
Next, the hacker must smear white wood glue or latex milk into the pattern created by the print out. Once this hardens, the hacker can peel away the pattern and swipe it on the fingerprint scanner.
The CCC (which has posted a YouTube video showing a person successfully carrying out the trick) says they've been able to use this tactic to bypass the iPhone 5S' fingerprint security system.
While the process requires some careful work on the part of the hacker, it's nothing the average tech-savvy individual couldn't figure out.
Hardly a New Trick, Hackers Say
It's also not a new trick, the CCC says.
"This process has been used with minor refinements and variations against the vast majority of fingerprint sensors on the market," the CCC noted on its blog.
Apple has not yet commented on the video or the CCC blog report.
Many security experts won't be surprised by the news. A number of industry insiders have previously pointed out that fingerprint authentication systems are flawed, and should not be a user's sole means of protecting their data and devices.
For example, two weeks ago Lookout security researcher Marc Rogers made clear that fingerprint authentication systems are anything but perfect.
"It is possible to copy a fingerprint and I think that as the technology sees wider usage, the techniques of copying fingerprints will only improve," Rogers said. (Source: computerworld.com)
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.