Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Android
    • Android
    • Cybersecurity

    Android Phones’ Fingerprint Sensors Vulnerable to Hackers

    Written by

    Todd R. Weiss
    Published August 9, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Android users have a new security issue to worry about, this time involving fingerprint sensors that could allow hackers to copy a user’s fingerprint image and use it to make purchases or conduct a wide range of supposedly secure transactions.

      Researchers at FireEye discovered the flaw, called a “fingerprint sensor spying attack,” which apparently gives hackers access to a vast amount of user fingerprints on Android mobile phones made by Samsung, HTC and Huawei, according to an Aug. 6 report by The Consumerist.

      The researchers who found and reported the vulnerability, Tao Wei and Yulong Zhang, said that “because the devices’ sensors aren’t locked down by manufacturers, it creates a vulnerability that allows hackers to obtain images of users’ fingerprints,” according to the story.

      Once the fingerprints are captured, the attackers are then able to use the images to impersonate the victim forever, the story states. The research identified the problem in mobile phones, but it could also be found in other devices that use fingerprint sensors, including laptops.

      Zhang “couldn’t specify which devices were more vulnerable to the hack, but did note that the iPhone was ‘quite secure’ because it encrypts fingerprint data,” the story reported.

      Device makers have since provided patches to repair the vulnerability after it was reported by the researchers.

      In July, another Android flaw was discovered by researchers with security firm Zimperium that potentially exposed some 950 million users to risk. The vulnerability is found in the Android Stagefright media library, which is a common element in Android versions 2.2 and higher. That flaw involved MMS (Multimedia Messaging Service) messages that are sent to Android users, which are automatically processed with the Stagefright media library. The flaws in large part are integer overflows that lead to potentially exploitable memory buffer overflow conditions, according to a recent eWEEK report.

      Earlier this week, Google announced that it is bolstering security in its Android mobile operating system through the introduction of new monthly security updates that will be issued over-the-air (OTA) to a wide range of Nexus mobile devices, according to an eWEEK report.

      The first such security update began rolling out on Aug. 5 to devices including the Nexus 4, Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10 and Nexus Player. The first security update includes fixes for issues reported since July 2015, including fixes for the libStageFright vulnerabilities. The fixes will also be released at the same time to the public via the Android Open Source Project. Nexus devices will continue to receive major updates for at least two years and security patches for three years from initial availability or 18 months from last sale of the device via the Google Store, whichever is longer.

      The additional step is the latest in Android’s arsenal to protect customers and their devices, according to Google.

      In June, Google announced that it will pay thousands of dollars to researchers who find and report vulnerabilities in the Android mobile operating system as part of a new bug bounty program the company unveiled. The Android Security Rewards program builds on the format used in the company’s well-known bug-hunting initiative for its Chrome Web browser. Software security researchers who find verifiable issues and disclose them by following the company’s guidelines can earn up to $38,000 per issue. The program is part of Google’s efforts to harden the Android platform.

      Rewarding researchers for vulnerabilities is not a new idea. In 1995, Netscape kicked off an initiative to pay programmers for finding bugs in its pioneering Web browser software. In 2002, Verisign iDefense created the first third-party program, offering to pay researchers for information on bugs in popular enterprise software. Now, companies, such as HackerOne and Bugcrowd, offer third-party services to create and manage vulnerability-reward programs.

      The Android Security Rewards program will be Google’s third bug bounty initiative. The company has two other reward programs and paid out more than $1.5 million last year to researchers. Currently, Google pays for security vulnerabilities found in the Chrome Web browser under its Chrome Reward Program and the occasional Chromium competition. The Google Vulnerability Reward Program (VRP), its second bounty program, pays prize money to researchers who find flaws in the company’s Websites, including Google.com, YouTube.com and Blogger.

      With its latest bug bounty, the company will increase its payout to flaw finders for more detailed vulnerability submissions. The prizes start at $500 for a moderate issue, $1,000 for a highly severe issue and $2,000 for a vulnerability considered critical.

      Todd R. Weiss
      Todd R. Weiss
      Todd R. Weiss is a seasoned technology journalist with over 15 years of experience covering enterprise IT. Since 2014, he has been a senior writer at eWEEK.com, specializing in mobile technology, smartphones, tablets, laptops, cloud computing, and enterprise software. Previously, he was a staff writer for Computerworld.com from 2000 to 2008, reporting on a wide range of IT topics. Throughout his career, Weiss has written extensively about innovations in mobile tech, cloud platforms, security, and enterprise software, providing insightful analysis to help IT professionals and businesses navigate the evolving technology landscape. His work has appeared in numerous leading publications, offering expert commentary and in-depth analysis on emerging trends and best practices in IT.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.