Friday, March 29, 2024

Nokia 9 PureView Fingerprint Scanner Bypassed using Chewing Gum Packet

Nokia released updates to fix Nokia 9 PureView’s unreliable in-display fingerprint sensor, but the update turns buggy.

After the update, multiple users complained that the phone can be bypassed now with an unregistered fingerprint or with a Chewing Gum Packet.

The Nokia 9 Fingerprint Scanner wasn’t reliable and the update was provided to address the scanner’s poor performance.

But the update results in the security flaw, which allows anyone to bypass the phone using a chewing gum packet, unregistered fingerprints, coin, and leather gloves.

Another user reported that flaw exists with Fingerprint Scanner, even before the update.

The latest update Pie Build v4.22C made the bug worse than it was, it allows strangers to bypass the phone.

We believe HMD will fix them right away, possibly the problem relies on the tweaked algorithm which unlocks the device if certain conditions are met.

In the meantime, users are recommended to use different authentication method such as PIN, password or facial recognition.

Earlier this month, a security flaw in Samsung’s Galaxy S10 ultrasonic biometric fingerprint scanner was bypassed by just having the duped 3D Printed Fingerprint of the mobile owner.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Android Security Update – Code Execution Flaw Let Hackers Control Your Android Device Remotely – Update Now

New Android Malware “BasBanke” Steal Financial Data Such as Credentials & Credit/Debit Card Numbers

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles