sb-nz logo
Story image

Can your iPhone be hacked using just Play-Doh? Yep.

Touch ID may not be as secure as you thought, with a mobile security company getting around the security with an unlikely partner in crime: Play-Doh.

Start-up Vkansee showed at Mobile World Congress how it used Play-Doh putty to copy a fingerprint and used that copy to unlock an iPhone.

The fingerprint belonged to Vkansee president Jason Chaikin, who created a mould of his fingerprint, then pressed Play-Doh onto the mould and created a replica.

Chaikin then pressed the Play-Doh copy onto an iPhone’s fingerprint scanner and the iPhone unlocked. Magic.

Touch ID can be used to unlock an iPhone or Ipad, and can be used to authorise services and purchases such as the App Store. 

According to Chaikin, he did the demonstration to highlight the lack of sophistication in today’s biometric solutions.

Luckily, Chaikin’s company offers a fingerprint sensor solution that offers a higher resolution than what are currently in iPhones.

Chaikin says that while fingerprint sensors are useful, they have their vulnerabilities because the technologies being used are ten years old.

While Apple hasn’t yet commented on the demo, it’s website reads, “Every fingerprint is unique, so it is rare that even a small section of two separate fingerprints are alike enough to register as a match for Touch ID. The probability of this happening is 1 in 50,000 for one enrolled finger."

Apple says its Touch ID technology only allows five unsuccessful fingerprint match attempts before users have to enter their passcode.

Story image
5 ways to use data science to predict security issues - Forcepoint
Data science enables people to respond to problems in a better way, and to also understand those problems in a way that would not have been possible 50 years ago.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More
Story image
Fast track your digital transformation with dynamic security services from Fortinet
Jon McGettigan, Fortinet A/NZ Regional Director, explains how enterprises can speed up their network service delivery programmes by embracing Fortinet’s dynamic security services.More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More
Story image
Fortinet SOARs to new heights of protection on the wings of AI & automation
Jon McGettigan, Fortinet A/NZ Regional Director, talks about SOAR (security orchestration, automation and response) and explains that effective SOAR starts with your security policy.More
Story image
Metallic adds data management and GDPR compliance
Now GDPR compliant, additions to the portfolio include eDiscovery features and support for Microsoft Hyper-V and Azure Blob and File storage.More