Recently, reports revealed that the lock screen feature of the Galaxy S3 and Galaxy Note 2 smartphone has a security flaw.
Initial reports insisted that the lock screen could be side-stepped briefly; however, later it was revealed that the vulnerability is complete and lets hackers break into the lock screen of the Galaxy S3.
Terence Eden, a mobile enthusiast, discovered the bug that allows one to briefly access the home screen of the Galaxy Note 2.
"Here's a rather nifty security flaw I discovered on Samsung's Android 4.1.2. It allows you - in limited circumstances - to run apps and dial numbers even when the device is locked," disclosed Eden in a blog post.
Shortly after Eden disclosed the security vulnerability on the Galaxy Note 2, another smartphone enthusiast, Sean McMillian, posted on the Full Disclosure mailing list the steps to bypass the lock screen for the Galaxy S3.
If you want to check if your Galaxy Note 2 and Galaxy S3 are susceptible to this bug, here's how:
How To Check Your Galaxy Note 2 For Vulnerability:
Step 1: Lock the device using the affected security lock screen types i.e. Pattern Lock, PIN, Face Unlock, and Password.
Step 2: Next, switch on the screen.
Step 3: Next, press Emergency Call tap followed by tapping Emergency Contacts.
Step 4: Press the Home button once.
Step 5: Next, after pressing the Home button, tap on any app/widget which is displayed on the Home Screen.
Step 6: If your device is vulnerable, tapping on the widget would prompt it into action without the Galaxy Note 2 being unlocked screen.
How To Check Your Galaxy S3 For Vulnerability:
To check if your Samsung Galaxy S3 has the security flaw and is vulnerable follow the steps below:
Step 1: On the code entry screen, press Emergency Call.
Step 2: Next, tap Emergency Contacts.
Step 3: Press the Home button once.
Step 4: Next, after pressing the Home button, press the power button quickly.
Step 5: If your device is vulnerable, pressing the power button again will bring you to the S3's home screen.
According to McMillan, this method may sometimes take a few tries to work and is not successful every time. The million dollar question: Is the Galaxy S3 really safe for enterprise users, as Samsung claims?
Is your Galaxy smartphone affected by the bug? Tell us in the comments.