The previous-generation Samsung Galaxy S5 could reportedly allow hackers to intercept fingerprint data from the device, according to a new report.
Smartphone security is a top priority in today's mobile-driven world, and fingerprint scanners aim to make everything safer and protect one's data. Security firm FireEye, however, has now discovered a glitch that could allow hackers to intercept fingerprint information on the Samsung Galaxy S5.
More specifically, Fingerprint data is stored in a secure place on the smartphone, but FireEye points out that hackers could capture that data while it is traveling from the fingerprint reader to that secure zone on the device.
"If the attacker can break the kernel, although he cannot access the fingerprint data stored in the trusted zone, he can directly read the fingerprint sensor at any time," a FireEye researcher explained to Forbes. "Every time you touch the fingerprint sensor, the attacker can steal your fingerprint."
The security firm further notes that hackers could do anything with that data once they obtain it from the smartphone's fingerprint reader. Perhaps even more worrisome, FireEye said that the Samsung Galaxy S5 is not the only smartphone that poses such risks, as other Android devices were vulnerable as well. The security firm did not specifically mention which other Android devices were in the same situation, but did note that the glitch does not affect Android 5.0 Lollipop or newer versions.
It's worth pointing out that this is not the first time that the fingerprint reader on the Samsung Galaxy S5 raises security concerns. Last year, for instance, German firm Security Research Labs (SRLabs) explained how they were able to hack the Samsung Galaxy S5 despite the device's fingerprint reader, by using a mold of a latent print (see image above).
Samsung, for its part, has now told Forbes that it takes data security and consumer privacy very seriously, and the company is currently looking into FireEye's claims. The smartphone maker has offered no additional comment at this point, but is expected to issue a more detailed response once it conducts its investigation. We'll keep you up to date as soon as more information becomes available, so stay tuned.