Researchers say that your android pattern can be unlocked in just five steps by attackers
If you have an android phone you must be feeling pretty secure with its best feature, the pattern lock. The pattern lock system is used among millions of Android users worldwide but here comes a big bummer!! You can actually break the Android pattern lock easily in five attempts.
On the contrary to what you may be thinking right now, complex patterns are even easier to crack comes a warning by security experts.
1 The standard pattern lock
The pattern lock security system protects devices such as smartphones and tablets. It gains preference over pin codes and text type passwords and used by 40% of Android users globally. As the standard practice, android users have five attempts to open their pattern lock after which the device gets locked and you need to wait 30 seconds before trying it again.
But!! New research from, Northwest University China, Lancaster University and the University of Bath in the UK have proved that hackers can easily crack the pattern with five attempts using algorithm software and video.
2 How attackers unlock your android pattern
Through covert video spying on the owner drawing the pattern lock while in a café or public place, phone attackers pretending to be engrossed in a phone can use the software to track the movements of fingertips in relation to the position of the device. They could then break the Android pattern lock. The algorithm provides a series of possible patterns within seconds’ .The phone attack works regardless of the video footage being viewed for on screen content. The results are so accurate that they are recorded on the attackers mobile even if he is two and a half meters away. On an SLR camera, the video footage could easily work at nine meters.
According to researchers, an evaluation of the attack was done using 120 different patterns collected from various android users. Researchers then cracked open 95% of phones within five attempts. The reason why complicated patterns were easier is because such connections between dots helped the algorithm narrow down the possible patterns and options.
3 Prevention measures
Researchers feel that such technology driven attacks would easily enable smart thieves to access a user’s phone to obtain sensitive data and information. It also allowed malware to be downloaded onto a user’s device without him suspecting anything.
Counter measures proposed by users include suggestions that users fully cover their device with hands while unlocking their phones in public places. Mixing security features such as pattern locks along with a password would also prevent attacks. Even dynamic changes of screen brightness and color could confuse the video surveillance of a phone screen.