sb-au logo
Story image

Can your iPhone be hacked using just Play-Doh? Yep.

Touch ID may not be as secure as you thought, with a mobile security company getting around the security with an unlikely partner in crime: Play-Doh.

Start-up Vkansee showed at Mobile World Congress how it used Play-Doh putty to copy a fingerprint and used that copy to unlock an iPhone.

The fingerprint belonged to Vkansee president Jason Chaikin, who created a mould of his fingerprint, then pressed Play-Doh onto the mould and created a replica.

Chaikin then pressed the Play-Doh copy onto an iPhone’s fingerprint scanner and the iPhone unlocked. Magic.

Touch ID can be used to unlock an iPhone or Ipad, and can be used to authorise services and purchases such as the App Store. 

According to Chaikin, he did the demonstration to highlight the lack of sophistication in today’s biometric solutions.

Luckily, Chaikin’s company offers a fingerprint sensor solution that offers a higher resolution than what are currently in iPhones.

Chaikin says that while fingerprint sensors are useful, they have their vulnerabilities because the technologies being used are ten years old.

While Apple hasn’t yet commented on the demo, it’s website reads, “Every fingerprint is unique, so it is rare that even a small section of two separate fingerprints are alike enough to register as a match for Touch ID. The probability of this happening is 1 in 50,000 for one enrolled finger."

Apple says its Touch ID technology only allows five unsuccessful fingerprint match attempts before users have to enter their passcode.

Story image
Endace and Palo Alto Networks launch integration to empower security teams
“The combination of Cortex XSOAR’s powerful orchestration and automation capabilities with the rich network history recorded by the EndaceProbe Analytics Platform gives security operations access to the conclusive forensic evidence they need to respond quickly and accurately to threats.” More
Link image
How to deploy containerised apps in your cloud infrastructure
Move your business into the future - take advantage of a free consultation to pinpoint how container-based applications can propel your cloud infrastructure to new heights.More
Link image
Webcast Series: Best security practices for a mobile workforce
Join an exclusive monthly webcast series to learn how to better secure your mobile workforce in the evolving threat landscape.More
Download image
Revealed: How to make authentication simple again
It's absolutely necessary for a healthy security landscape, but authentication has become convoluted and bogged-down. Simplify and secure your processes with this tool.More
Link image
Protect yourself from the perfect storm of cyber threats
COVID-19 has created an opportunity like no other for cyber attackers. With anxieties high and workforces at home, risk profiles are rising everywhere. Here's how one business can help protect yours. More
Link image
Phishing has never been more lucrative. Here's how to avoid it
Risk of a serious phishing breach has reached an all-time high as workforces stay at home. Find out how to mitigate the risk to your business. More