Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Android
    • Android
    • Cybersecurity

    Android Phones’ Fingerprint Sensors Vulnerable to Hackers

    By
    Todd R. Weiss
    -
    August 9, 2015
    Share
    Facebook
    Twitter
    Linkedin
      Android security

      Android users have a new security issue to worry about, this time involving fingerprint sensors that could allow hackers to copy a user’s fingerprint image and use it to make purchases or conduct a wide range of supposedly secure transactions.

      Researchers at FireEye discovered the flaw, called a “fingerprint sensor spying attack,” which apparently gives hackers access to a vast amount of user fingerprints on Android mobile phones made by Samsung, HTC and Huawei, according to an Aug. 6 report by The Consumerist.

      The researchers who found and reported the vulnerability, Tao Wei and Yulong Zhang, said that “because the devices’ sensors aren’t locked down by manufacturers, it creates a vulnerability that allows hackers to obtain images of users’ fingerprints,” according to the story.

      Once the fingerprints are captured, the attackers are then able to use the images to impersonate the victim forever, the story states. The research identified the problem in mobile phones, but it could also be found in other devices that use fingerprint sensors, including laptops.

      Zhang “couldn’t specify which devices were more vulnerable to the hack, but did note that the iPhone was ‘quite secure’ because it encrypts fingerprint data,” the story reported.

      Device makers have since provided patches to repair the vulnerability after it was reported by the researchers.

      In July, another Android flaw was discovered by researchers with security firm Zimperium that potentially exposed some 950 million users to risk. The vulnerability is found in the Android Stagefright media library, which is a common element in Android versions 2.2 and higher. That flaw involved MMS (Multimedia Messaging Service) messages that are sent to Android users, which are automatically processed with the Stagefright media library. The flaws in large part are integer overflows that lead to potentially exploitable memory buffer overflow conditions, according to a recent eWEEK report.

      Earlier this week, Google announced that it is bolstering security in its Android mobile operating system through the introduction of new monthly security updates that will be issued over-the-air (OTA) to a wide range of Nexus mobile devices, according to an eWEEK report.

      The first such security update began rolling out on Aug. 5 to devices including the Nexus 4, Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10 and Nexus Player. The first security update includes fixes for issues reported since July 2015, including fixes for the libStageFright vulnerabilities. The fixes will also be released at the same time to the public via the Android Open Source Project. Nexus devices will continue to receive major updates for at least two years and security patches for three years from initial availability or 18 months from last sale of the device via the Google Store, whichever is longer.

      The additional step is the latest in Android’s arsenal to protect customers and their devices, according to Google.

      In June, Google announced that it will pay thousands of dollars to researchers who find and report vulnerabilities in the Android mobile operating system as part of a new bug bounty program the company unveiled. The Android Security Rewards program builds on the format used in the company’s well-known bug-hunting initiative for its Chrome Web browser. Software security researchers who find verifiable issues and disclose them by following the company’s guidelines can earn up to $38,000 per issue. The program is part of Google’s efforts to harden the Android platform.

      Rewarding researchers for vulnerabilities is not a new idea. In 1995, Netscape kicked off an initiative to pay programmers for finding bugs in its pioneering Web browser software. In 2002, Verisign iDefense created the first third-party program, offering to pay researchers for information on bugs in popular enterprise software. Now, companies, such as HackerOne and Bugcrowd, offer third-party services to create and manage vulnerability-reward programs.

      The Android Security Rewards program will be Google’s third bug bounty initiative. The company has two other reward programs and paid out more than $1.5 million last year to researchers. Currently, Google pays for security vulnerabilities found in the Chrome Web browser under its Chrome Reward Program and the occasional Chromium competition. The Google Vulnerability Reward Program (VRP), its second bounty program, pays prize money to researchers who find flaws in the company’s Websites, including Google.com, YouTube.com and Blogger.

      With its latest bug bounty, the company will increase its payout to flaw finders for more detailed vulnerability submissions. The prizes start at $500 for a moderate issue, $1,000 for a highly severe issue and $2,000 for a vulnerability considered critical.

      Todd R. Weiss
      As a technology journalist covering enterprise IT for more than 15 years, I joined eWEEK.com in September 2014 as the site's senior writer covering all things mobile. I write about smartphones, tablets, laptops, assorted mobile gadgets and services,mobile carriers and much more. I formerly was a staff writer for Computerworld.com from 2000 to 2008 and previously wrote for daily newspapers in eastern Pennsylvania. I'm an avid traveler, motorcyclist, technology lover, cook, reader, tinkerer and mechanic. I drove a yellow taxicab in college and collect toy taxis and taxi business cards from around the world.

      MOST POPULAR ARTICLES

      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×