computer Security

Samsung Galaxy S10 Fingerprint can be Hacked by Anyone Using $3.41 Worth Screen Protector

A couple in the UK accidentally found a security flaw in Samsung Galaxy S10 fingerprint that allows anyone can unlock the phone by just fitting $3.41 Worth Screen Protector that was purchased on eBay.

A Cheap screen protector could literally allow anyone to unlock the fingerprint protected Samsung Galaxy s10 in just a second which leads anyone can access the personal details in the phone in the financial apps.

Lisa Neilson, 34, bought the gel cover to protect her new S10 and the phone unlocked after she fits the screen protector using any fingers but there was only one finger was registered on her phone.

Later she has checked with her husband Wes thumbs and got that she could unlock the phone using his thumbprint, not only using his fingerprint but the gel cover let anyone can bypass the fingerprint and unlock the phone.

Lisa also checked her sister’s Samsung and it was exactly the same when fitted with the case.

According to a report published in the Sun, “Lisa was called to customer services and took control of the phone remotely and went into all the settings and finally admitted it looked like a security breach.”

Lisa said “This means that if anyone got hold of my phone they can access it and within moments could be into the financial apps and be transferring funds.

According to Samsung Spokesperson, ”We’re investigating this internally. We recommend all customers to use Samsung authorized accessories, specifically designed for Samsung products.”

You can follow us on LinkedinTwitterFacebook for daily Cyber security and hacking news updates.

Also Read

High Severity Vulnerability Found in Intel Software Let Hackers Perform Escalation of Privilege, DoS Attack

Exploiting an Exim Email Server Vulnerability Using EHLO Strings

Balaji N

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Defend Ransomware Attacks With Top Effective Proactive Measures in 2024

We're currently living in an age where digital threats loom large. Among these, ransomware has…

25 mins ago

GoTitan Botnet Actively Exploiting Apache ActiveMQ Vulnerability

Attackers are exploiting the recently discovered critical security vulnerability tracked as (CVE-2023-46604) affecting Apache ActiveMQ…

17 hours ago

Cybercriminals are Showing Hesitation to Utilize AI When Executing Cyber Attacks

Media reports highlight the sale of LLMs like WormGPT and FraudGPT on underground forums. Fears…

18 hours ago

Vigil: Open-source Security Scanner for LLM Models Like ChatGPT

An open-source security scanner, developed by Git Hub user Adam Swanda, was released to explore…

18 hours ago

Slovenia’s Biggest Power Provider has Suffered a Cyberattack

One of Slovenia's major power providers, HSE, has recently fallen victim to a significant cyberattack.…

18 hours ago

Genesis Market Technique: Hackers Exploited Node.js and EV Certificates

In the labyrinthine landscape of cyber threats, the Trend Micro Managed XDR team has uncovered…

21 hours ago