A few new vulnerabilities came to light in the recent days. I will reference couple of videos I came across while reading on the subject of security.

Terence Eden reports that you can run apps and dial numbers on Samsung’s Android 4.1.2 “even when device is locked”.

Terence posts a How-To:


  1. Lock the device with a “secure” pattern, PIN, or password.
  2. Activate the screen.
  3. Press “Emergency Call”.
  4. Press the “ICE” button on the bottom left.
  5. Hold down the physical home key for a few seconds and then release.
  6. The phone’s home screen will be displayed – briefly.
  7. While the home screen is displayed, click on an app or a widget.
  8. The app or widget will launch.
  9. If the widget is “direct dial” the phone will start ringing.

It is interesting to see a community response to his video.

Jan de Vos posts: “XPeria S with Android 4.0 also has this vulnerability, although the period that the home screen is visible is actually smaller there.  Same actions: press ’emergency call’, and from that screen push ‘home’ – the home screen will very briefly show before the lock screen is visible again.” Pavan Santani believes that this flaw can be “patched” via App lock Software and locking contacts.

Shortly after similar flaw was reported in Galaxy S III. This flaw is rumored to be fixed by the end of this year.

In addition, another video was mentioned in the discussion thread,  “How ty bypass iPhone 5 passcode on iOS6.1/6.0.2/6.0.1 . Prank your friends.” – this hack supposedly should be ineffective with version 6.1.3.

Security flaws are frequently discovered in new and old devices – it would be sensible to keep an eye on the facts and make decisions to change devices, if and when it makes sense.


Copyright © 2019 powersolution.com. All rights reserved.