A new report from SRLabs indicates the new Samsung Galaxy S 5 fingerprint scanner is similar to other devices on the market in being open to attacks using molds of fingerprints. Similar to the iPhone 5S and other commercial grade fingerprint scanners, malicious individuals can make a mold of a fingerprint that is sufficient to unlock a Galaxy S 5. In the case of the latest Samsung smartphone to hit the market, Samsung does not require any additional password or PIN to be used in conjunction with the fingerprint to unlock the device or to take advantage of PayPal’s integration with the fingerprint scanner. » Read the rest
Over on the XDA Developers site, forum member pcelli figured out how to get a Samsung Galaxy Gear smartwatch working with his Nexus 5 smartphone. This had to be done on an unofficial basis as up to now Samsung has only enabled support for the Galaxy Gear with other Samsung devices. Although there have been some hints indicating Samsung may eventually break down the wall around that particular garden, getting a Galaxy Gear to work with a non-Samsung device may never be officially supported. » Read the rest
Mad Catz’s Android-powered MOJO gaming console has been successfully rooted, and as a result, users will be able to access the Google Play Store, as well as thousands of other applications.
It obviously involves flashing a custom boot image using your computer (no overwriting the existing ROM), so be careful if you don’t have any rooting experience.
Gibson Security has found a security issue in Snapchat, the popular photo/video messaging platform, which could allow hackers to easily exploit the program’s API to steal data, as well as scam/stalk Snapchat users.
The security team had presented the issues to Snapchat in August and says that they still have not been addressed, and warn that they pose serious privacy risks for users.
Phone numbers of users can easily be discovered, and dummy accounts can be created in bulk. The code of the exploit is now available to the public, so pretty much anyone with any hacking experience could exploit it. Gibson Security says that the bug can be fixed with “ten lines of code.”
Are you one of the few that were lucky enough to nab the elusive Nexus 4 by Google? If you do possess Android’s hard to attain device and are into modding/rooting, then finding the perfect ROM can be hard, and maybe even overwhelming at times. RasBean Jelly is a custom AOSP ROM made by the developer Rascarlo and has been around since the Galaxy Nexus days when it was called Rascream (back when Ice Cream Sandwich was the latest ROM). If you’re an avid ROM flasher, then you’re well aware that a handful of the ones you flash tend to have bugs and other problems that you’ll frequently encounter. While that’s expected, that’s one thing that I don’t particularly enjoy about flashing custom ROM’s.
With RasBean, I have never encountered a bug or any problems in any build that I’ve tried, even in my ICS Galaxy Nexus days. RasBean is an AOSP based ROM that’s dedicated to speed and overall stability. While Rascarlo does include several additional features to the ROM, he makes sure to clean the ROM of necessary codes and “bloat.” Thus, if you’re a huge CM or AOKP fan, then this ROM may not be for you as it doesn’t have the dozens upon dozens of added features that those two ROM’s tend to have. But if you’re looking for a super fast ROM with no bugs, then RBJ just might be for you! Hit the break to find out more.
With a name like “Pimp My ROM,” how can one not give it a try. All it needs is Xzibit’s face plastered on their banner and it’ll be perfect! Pimp My ROM is a cool little script that allows the user to easily install hacks, tweaks and many other things into their custom ROM. Here’s a small example of what you can do with this:
The CyanogenMod team has formally announced that official CM10 nightlies will be available starting tonight. For rooted users, this is Christmas time as CM ROM’s are the current king when it comes to the Android modding community. The devices receiving the CM10 nightly treatment will include, but are not limited to:
- The US SGS3 variants
- The Galaxy Nexus variants
- The Nexus S varaints
- The Nexus 7
- The Transformer and Transformer Prime
- The SGS1 variants (Vibrant, Captivate, International, and i9000b)
- The SGS2 i9100g
- P3 and P5 tablets
According to the CM team, “Other devices will join the roster as they become ready and gain their maintainers blessing for nightlies.”
Just keep in mind that you, and you only, are responsible for anything that were to happen to your device if you decide to delve into flashing custom ROM’s. With that said, enjoy and let us know your experience with the CM10 nightlies once they become available later tonight!
source: CM’s Google+ Page
Hey modders, devs, and hackers! You know how you keep that “USB Debugging” option checked in settings? Sure, it’s useful when you need to root a device or test an app you’re developing, but you might want to consider unchecking it when not using it.
XDA developer M.Sabra says that anyone with a little ADB knowledge can easily hack Android’s pattern unlock, essentially getting access to your entire device. Apparently it’s not that difficult to do either. Root isn’t even required.
We won’t go into detail here on how to do it, but hit the source link to find out how easily your phone can get hacked if you lose it. Don’t believe your pattern gives you total protection.
The second I saw this story on the XDA thread, I envisioned many Verizon Samsung Galaxy S III users giving Verizon the proverbial middle finger. This locked bootloader issue with Verizon’s Samsung Galaxy S III has certainly made a full circle. It started off with many angry customers when Verizon formally announced that the bootloader will be locked on their Galaxy S III, but soon after there was hope as a couple of miss-informed Verizon and Samsung reps told various people that an update for the S III would be out soon that would unlock the bootloader. Verizon quickly denied that rumor and left us all with the hopes of XDA soon finding a way to crack Verizon’s lock on the bootloader.
Well folks, that day has come as the XDA developer by the name of AdamOutler has released instructions on how to unlock your Verizon Galaxy S III’s bootloader. Before I give you all the instructions, it’s important to first read AdamOutler’s precautionary statement first:
Let me make this clear. If Samsung updates your device’s bootloaders, using this tool could potentially brick your device. Once you apply this, never accept a factory update without first flashing the Odin Packages in the Original Post of this thread. As a general rule, you want to be the last guy to apply any Samsung update. Run custom.
As of the date of this posting, this works great on Linux and it should work wonderfully on Mac too. If you’re using Windows, I recommend downloading Windows Ubuntu Installer(WUBI) to install Ubuntu from within Windows.
First you’ll need to download the file needed for this:
If you have a Samsung Galaxy S II phone that is running a custom Jelly Bean ROM, you have probably noticed that you do not have NFC capabilities on your device. If you would like to restore that functionality, we have good news – XDA Senior Member jthatch12 has created a hack.
This will only work on phones that had the necessary NFC hardware built into the phone. The other requirement is that the phone is running Jelly Bean. Thus far users have confirmed success on i777 and M250k/M250s devices. The hack should work on:
- i9100 = NO
- i9100P = YES (it’s an i9100 exactly, but with NFC. ROMs for i9100 will work, but need to be modified to show NFC settings, otherwise no NFC options will show)
- i9100G = NO, it’s completely different from the i9100 hardware (TI-OMAP instead of Exynos). ROMs from i9100/P don’t work.
- T989 (T-Mobile GS2) = YES, but it’s completely different from the i9100 hardware (Snapdragon S3 instead of Exynos). ROMs from i9100/P don’t work.
- i777 (AT&T GS2) = YES, AOSP based roms have it but i9100 hellraised roms are missing it(due to NFC not being a feature of the i9100)
- D710 (Sprint GS2) = NO
If you are interested in trying this hack out on your NFC equipped Galaxy S II, you just need to download the file from the XDA forum thread (use source link below) and then flash it onto your device from recovery mode.
source: XDA Developers Forum