Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ Information Security Newspaper|Infosec Articles|Hacking News Wed, 09 Aug 2023 23:00:42 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.4 https://www.securitynewspaper.com/snews-up/2018/12/news5.png Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ 32 32 10 impossible mobile patterns to break https://www.securitynewspaper.com/2023/08/08/10-impossible-mobile-patterns-to-break/ Tue, 08 Aug 2023 17:32:30 +0000 https://www.securitynewspaper.com/?p=27014 Mobile patterns are the used by everyone to unlock their mobile phones. Everyone loves to mobile patterns over the pass code or password. One of the most important factor isRead More →

The post 10 impossible mobile patterns to break appeared first on Information Security Newspaper | Hacking News.

]]>
Mobile patterns are the used by everyone to unlock their mobile phones. Everyone loves to mobile patterns over the pass code or password. One of the most important factor is its ease to unlock the mobile phone. The more stylize your pattern is, more you look cool while unlocking mobile phone.  Even this also prevent shoulder surfing attack. To we will show you 10 most impossible mobile patterns to break. Even if you unlock your mobile phone in front of somebody he or she will not be able to guess. Nor even your girlfriend and boyfriend will be able to guess your pattern.

So without wasting too much time we will show you top 10 mobile patterns that are hard to break. Before we jump let us understand that pattern is combination of 9 dots in most of the cases. Below figure will help you understand the numbers used behind these patterns.

Now we understood the concept behind the pattern. The way it works is that whenever we draw any pattern its converted to the numbers for the mobile phone to unlock it. Mobile takes these numbers as password and unlocks your mobile phone. Let’s see which are the 10 most impossible mobile patterns to break.

1. FISH (2-5-8-4-6-9-3-1)

The is called fish pattern and the number written in brackets are the sequence of the patterns to be followed to create a pattern that resembles fish. Its starting with dot number 2 and then draw a line to dot 5 and then from dot 5 to dot and so on as shown below.

Fish mobile pattern

2. Love Angle (2-5-9-1-4-8-6-3-7)

Its is lovely angle pattern use it if you love someone but don’t want to tell her or him.

3. Ribbon (5-7-3-6-4-1-9)

4. Bird man mobile pattern (2-5-7-3-6-4-1-9)

5. Robo Head (2-5-4-6-3-9-8-7-2)

6. MKBHD (4-8-6-9-3-5-1-7)

7. Illusion (2-1-3-5-4-6-8-7-9)

8. Impossible (8-6-5-4-2-1-3-7-9)

9. MAZE (1-2-5-4-6-3-9-8-7)

10. Time Machine (8-6-5-4-2-3-1-9-7)

The only important is that whenever you use any of these just note down the number sequence. You can refer your number sequence if in case you get in your own trap.

The post 10 impossible mobile patterns to break appeared first on Information Security Newspaper | Hacking News.

]]>
New technique of hacking Android Pin & iPhone Passcode exploits phone sensor data https://www.securitynewspaper.com/2023/01/03/new-technique-of-hacking-android-pin-iphone-passcode-exploits-phone-sensor-data/ Tue, 03 Jan 2023 22:11:12 +0000 https://www.securitynewspaper.com/?p=26136 According to a research conducted by NTU, hackers are able to guess the PIN on your phone by exploiting its sensor data. Hackers may be able to unlock a smartRead More →

The post New technique of hacking Android Pin & iPhone Passcode exploits phone sensor data appeared first on Information Security Newspaper | Hacking News.

]]>
According to a research conducted by NTU, hackers are able to guess the PIN on your phone by exploiting its sensor data.

Hackers may be able to unlock a smart phone by guessing the security PIN using data obtained from the many physical sensors included inside the device.

According to researchers from Nanyang Technological University, Singapore (NTU Singapore), instruments found in smart phones such as the accelerometer, gyroscope, and proximity sensors represent a potential security vulnerability. Their findings were published on December 6 in the open-access Cryptology ePrint Archive.

The researchers were able to unlock Android smart phones with a success rate of 99.5% after only three attempts when working with a phone that had one of the 50 most common PIN numbers. This was accomplished by using information gathered from six different sensors found in smart phones in conjunction with cutting-edge machine learning and deep learning algorithms.

The previous greatest success rate for hacking a phone was 74% for the 50 most frequent pin numbers; however, the method developed by NTU may be used to guess all 10,000 potential permutations of four-digit PINs.

Researchers at Temasek Laboratories @ NTU, led by Dr. Shivam Bhasin, NTU Senior Research Scientist, used sensors in a smart phone to model which number had been pressed by its users. The researchers based their model on the angle at which the phone was held as well as the amount of light that was blocked by the thumb or fingers.

The researchers feel that their study shows a serious vulnerability in the security of smart phones. This is due to the fact that accessing the sensors included inside the phones does not need the user to provide any rights, and they are readily accessible for any software to use.

The manner in which the studies were carried out

The team of researchers used Android phones and installed a unique program on each one. This application gathered data from six different sensors, including the accelerometer, gyroscope, magnetometer, proximity sensor, and barometer.

“When you hold your phone and type in the PIN, the phone moves in a totally different manner depending on whether you touch the number one, five, or nine. Additionally, hitting 1 with your right thumb will obstruct more light than pushing 9 would “Dr. Bhasin, who worked on the project with his colleagues Mr. David Berend and Dr. Bernhard Jungk, reveals that they worked on it for a total of ten months.

The classification system was trained using data acquired from three persons, each of whom input a random set of 70 four-digit pin numbers on a phone. These numbers were used to train the algorithm. Additionally, it was recording the pertinent sensor responses at the same time.

The classification system, which utilizes a technique known as deep learning, was able to assign varying degrees of significance to each of the sensors, based on how sensitive each sensor was to the various numbers that were pushed. This helps reduce aspects that it determines to be of less importance, which in turn raises the percentage of successful PIN retrievals.

Despite the fact that each person enters the security PIN on their phone in a manner that is unique to them, the researchers demonstrated that over time, success rates increased as the algorithm was given data from an increasing number of users.

Therefore, even while a malicious app would not be able to properly guess a PIN right away after installation, it might utilize machine learning to gather data over time from thousands of users’ phones to learn their PIN input pattern and then launch an attack later when the success rate is considerably greater.

According to Professor Gan Chee Lip, Director of the Temasek Laboratories at NTU, this study demonstrates how devices with seemingly strong security can be attacked using a side-channel. Professor Gan Chee Lip explained that sensor data could be diverted by malicious applications to spy on user behavior and help access PIN and password information, as well as other sensitive information.

“In addition to the risk of passwords falling into the wrong hands, our primary fear is that access to the information stored on a user’s phone sensors might expose much too much about the user’s behavior. This has enormous consequences for privacy, and businesses and people alike should give it the urgent attention it requires “added Prof Gan.

According to Dr. Bhasin, it would be beneficial for mobile operating systems to limit access to these six sensors in the future. This would allow users to actively select to provide rights to only reliable applications that have a need for them.

Dr. Bhasin recommends that users of mobile devices have PINs that include more than four digits, in addition to other authentication techniques such as one-time passwords, two-factor authentications, and fingerprint or face recognition. This will help users keep their mobile devices safe.

The post New technique of hacking Android Pin & iPhone Passcode exploits phone sensor data appeared first on Information Security Newspaper | Hacking News.

]]>