Month: February 2012

Cracking PIN and Password Locks on Android

As you may know it is possible to get around the pin and password lock on an Android smartphone. In this post we will describe the following two ways to get around it: on a rooted smartphone with the help of the JTAG interface

Read More →

Cracking the Pattern Lock on Android

As you maybe know it is very easy to get around the pattern lock on an Android smartphone. In this post we will describe the following two ways to get around it: on a rooted smartphone with the help of the JTAG interface

Read More →

Cracking the Face Recognition Lock on Android

Since Android 4.0 is available, the user has the possibility to unlock his smartphone by looking in the front-camera. This feature is called face unlock. Just some hours after Google has presented the new Android version including this feature, it was broken by some blogger who just hold a picture of the person the smartphone belongs to in front of the locked smartphone. As a proof, there are plenty videos on youtube. With this demonstration in mind, you have to come to the conclusion that face recognition isn't a real lock feature, its more a fancy way of the old screen lock were you just have to swipe over the display.

Read More →

Detailed Analysis of Android.Bmaster

Intro: What is Android.Bmaster? This new malware-family emerged some weeks ago in third-party Chinese Android-Markets. This malware is taking advantage of the GingerBreak exploit to gain root privileges. This exploit is not embedded into the application, instead it is dynamically downloaded from a remote server together with other malicious apps. This kind of behaviour is

Read More →

Detailed Analysis of Android.FakeRegSMS.B

Intro: What is Android.FakeRegSMS.B? This new malware-family emerged some weeks ago in an unofficial Android-Market. It sends SMS messages to premium rated numbers and tries to hide this action from the malware investigators by using some kind of steganography. After investigating the app, we would declare this app more as FRAUD than as real MALWARE,

Read More →