7-year-old Hacks Apple Touch

7-year-old Hacks Apple Touch

As soon as a new model of smartphone hits the market, criminals have already or are figuring out how to hack it. The same holds true for Apple’s Touch ID fingerprint identification system, only this system wasn’t hacked by a notorious cybercriminal or thief. Nope! It was hacked by a 7-year-old boy! And, it was done without knowing any code!

As Matthew Green, a professor who teaches computer security and cryptology at at Johns Hopkins University (JHU), slept soundly, his 7-year-old son, Harrison, snuck into his dad's room, grabbed his dad’s hand and pressed his finger against the Touch ID scanner on his iPhone6. Yep, that was all it took for this youngster to gain access to his dad’s iPhone!

“This is a really serious problem,” said Professor Green. “In a situation where you’re under arrest, biometrics is not very good.”

Of course, little Harrison didn’t want to exploit his dad or compromise any of his critical information. This “hack” was all about playing Minecraft and Angry Birds.

(Andrey_Popov / Shutterstock.com)

About the Author

Ginger Hill is Group Social Media Manager.

Featured

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.