Learn Hacking Online, We offer tons of computers and hacking tips and tricks.

Breaking News

Saturday 10 June 2017

Bypass Samsung Galaxy S8

             Bypass Samsung Galaxy S8

Image result for Bypass Samsung Galaxy S8

                                                                                                      BY.MICKY VERMA

Bypass Samsung Galaxy S8 Iris Recognition Feature:-


Mobile companies are launching to secure their Smartphones like Fingerprints, iris recognition and more security features but Hackers are always to find a way to unlock Smartphones. German Hackers group Chaos Computer Clubs (CCC) breaks iris recognition system of the Samsung Galaxy S8.

How to Bypass?

CCC group is simply used the night mode setting on a Sony digital camera to Capture a medium range photo of their subject. To capture iris pictures is with a digital camera in night-shot mode or the infrared filter removed. In the infrared light spectrum – usually filtered in cameras – the fine, normally hard to distinguish details of the iris of dark eyes are well recognizable.

Iris recognition may be barely sufficient to protect a phone against complete strangers unlocking it. But whoever has a photo of the legitimate owner can trivially unlock the phone. „If you value the data on your phone – and possibly want to even use it for payment – using the traditional PIN-protection is a safer approach than using body features for authentication“, says Dirk Engling, spokesperson for the CCC. Samsung announced integration of their iris recognition authentication with its payment system „Samsung Pay“. A successful attacker gets access not only to the phone’s data, but also the owner’s mobile wallet.

Samsung reacts on this issue and said,

"We are aware of the issue, but we would like to assure our customers that the iris scanning technology in the Galaxy S8 has been developed through rigorous testing to provide a high level of accuracy and prevent attempts to compromise its security, such as images of a person's iris. If there is a potential vulnerability or the advent of a new method that challenges our efforts to ensure security at any time, we will respond as quickly as possible to resolve the issue."

How to Protect ?

  • Do not use Fingerprint Scan
  • Do not use Facial recognition
  • Always Keep Strong Password


No comments:

Post a Comment

Pages