Duress Codes for Fingerprint Access Control

Mike Specter has an interesting idea on how to make biometric access-control systems more secure: add a duress code. For example, you might configure your iPhone so that either thumb or forefinger unlocks the device, but your left middle finger disables the fingerprint mechanism (useful in the US where being compelled to divulge your password is a 5th Amendment violation… Continue reading Duress Codes for Fingerprint Access Control

Security Risks of the President’s Android Phone

Reports are that President Trump is still using his old Android phone. There are security risks here, but they are not the obvious ones. I’m not concerned about the data. Anything he reads on that screen is coming from the insecure network that we all use, and any e-mails, texts, Tweets, and whatever are going out to that same network…. Continue reading Security Risks of the President’s Android Phone

Capturing Pattern-Lock Authentication

Interesting research — "Cracking Android Pattern Lock in Five Attempts": Abstract: Pattern lock is widely used as a mechanism for authentication and authorization on Android devices. In this paper, we demonstrate a novel video-based attack to reconstruct Android lock patterns from video footage filmed u sing a mobile phone camera. Unlike prior attacks on pattern lock, our approach does not… Continue reading Capturing Pattern-Lock Authentication

Faulty Phone Battery May Have Caused Fire That Brought Down EgyptAir Flight MS80

New submitter drunkdrone writes: “French authorities investigating the EgyptAir crash that killed 66 people last year believe that the plane may have been brought down by an overheating phone battery,” reports International Business Times. Investigator… Continue reading Faulty Phone Battery May Have Caused Fire That Brought Down EgyptAir Flight MS80