Samsung Galaxy Note II Lock Screen Bypass Vulnerability

Galaxy Note 2 Samsung Galaxy Note II Lock Screen Bypass Vulnerability
If you’re an iOS user then it’s a high probability that you’ve heard about the security flaws found in iPhone recently. If you haven’t then you can read about it here.
This time it’s Android which is in the buzz these days. Specifically, it’s the creative phablet Samsung Galaxy Note II which is in the news. A Youtuber named Terence Eden recently uploaded a video on Youtube demonstrating the security flaw in the Samsung Galaxy Note II. The vulnerability shows how a user can bypass the lock screen and access the apps or calls from the home screen of Android OS. This vulnerability was demonstrated on a Note II running on Android 4.1.2 stock OS. Though, a user can only access the homescreen for a second or two but that timespan is enough to make a call or open any app on the homescreen if you’re quick enough.

Galaxy Note 2 Lock Screen Bypass Vulnerability

I wonder if it’s just Galaxy Note II which is having this vulnerability or maybe it’s the same for Galaxy lineup running Android 4.1.2 such as a Samsung Galaxy S3. Well, my colleague has a Galaxy S3 so I reckon that it’s time to test it out on an S3 as well. I’ll update this post after checking that on a Galaxy S3 soon. Till then, happy hacking

Read more at:http://hackingarticles.com/samsung-galaxy-note-ii-lock-screen-bypass-vulnerability/

5 Comments

  1. If you need to hire a professional hacker to help access your partner's phone remotely, kindly contact us at phonespyapps1@gmail.com or +1 3478577580

    ReplyDelete
    Replies
    1. ◾PROTOCOL SHIELDERS◾
      HELLO, I am COREY RODRIGUEZ by name,the only CEO of protocol-cyber-shield-hackers.  In this message, we will explain how you can almost avoid SCAMMERS and stay safe,  plus how our organization works. Read it carefully,Its reading will not take more than 10mins. 
      We kindly URGE you to not respond without have read the entire text. Those who mail without have read everything, ask questions that are been answered here.

      ⚠️WARNING:
      MOST HACKERS YOU SEE HERE ARE FAKES AND SIMULTANEOUSLY INCONGRUOUS. 
      It tears US up when we receive bitter mails of Jobs attempts proposals from most clients with hacking issues but never get close to having them done, thereby wasting a lot $ in the process, 
      EXAMPLES: 
      ➡️MOBILE PHONE HACKING.
      ➡️BINARY FUNDS&BITCOIN RECOVERIES.

      ➡️SOCIAL MEDIA ACCOUNT&EMAIL HACKING etc....
      if you in a haste to have any of these done by seeking hackers yourselves,you will only get ripped.
      PLEASE PAY ATTENTION TO THIS ARTICLE AS YOU READ THROUGH IT.

      HOW WOULD YOU KNOW?? 

      TAKE NOTE AND PRECAUTIONS:

      1. you see uncertified email accounts carrying numberings likeiamhacklord1232@(gmail,yahoo or hotmailDOTcom)  pls flee from them, BIG SCAMMERS.

      They take your money and never do your job.

      2. you see posts like "do you need to spy on spouse?" All fake!just a way to lure you towards getting ripped!. 3, posting fake testimonies and comments to trick you into feeling safe. Pls endeavour to ignore!! 

      ➡️NOTE: beware as we urge you not to make respond to any "IVAN HONG,PETER SANTOS,MONICA HART (impersonating with our articles pretending to work under us)
      WE ONLY HAVE 2 EMAILS WHICH ARE LISTED BELOW THIS ARTICLE TO ATTEND TO ALL MANNERS OF CYBER HACKING ISSUES.

                             ◾VERY IMPORTANT ◾
      For years now, We've helped  organizations  secure data base,  so many sites USE US AS SECURITY BACK UP TEAM BECAUSE OF OUR METHODS OF  HANDLING CYBER MISHAPS. 

      "iPhone&ANDROID HACKS"

      "CLEAR CRIMINAL RECORDS"   

      "FUNDS RECOVERIES" AND LOT MORE BEEN DONE IN SHORT TIMING.
      these are significant EXPERIENCES & RECORDS a good and effectively fully recognized organization must firmly ascertain. 

                              ◾OUR AIMS HERE◾

      1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.

      2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the  availability of time given for Job contracts given to us.Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.
       write us on:
      ◾Protocolhacks@gmail .com
      ◾Cybershieldnotch@gmail .com
      COREY ROD, 
      SIGNED...
      Thank you..

      Delete
  2. Do you need to hack into any, databaseserver spy on Facebook,Emails, Whatsapp, Viber, Snapchat, Instagram and many more.
    I urge you to get in touch with the best people for the job, i have confirm the service when i need to spy on my spouse phone. They are good at Phone Cloning and other hack job.
    Thanks guys for the team work check their site. http://hackintechnology.com/

    ReplyDelete
  3. He is no scam,i tested him and he delivered a good job,he helped me settle bank loans,he also helped my son upgrade his scores at high school final year which made him graduate successfully and he gave my son free scholarship into the college,all i had to do was to settle the bills for the tools on the job,i used $500 to get a job of over $50000 done all thanks to Walt,he saved me from all my troubles,sharing this is how i can show gratitude in return for all he has done for me and my family

    Gmail; Brillianthackers800@gmail.com
    Whatsapp number; +1(224)2140835

    ReplyDelete
  4. Guys What's up

    We are selling Fresh Fullz & TOOLS Here
    @killhacks Tel-egram
    75-28-22-04-0 I_C_Q

    Complete info available in Fullz
    SSN DOB DL EMPLOYEE all info
    CC FULLZ
    HIGH CS FULLZ
    All Available

    Tools With Complete Tutorials Guide
    Kal-i Linux
    Key_Loggers
    Btc Crac_ker
    FB/WA Hac-king
    CC HAC-King

    All stuff is legit & verified
    If you need anything Ping me here
    @leadsupplier
    7.5.2.8.2.2.0.4.0 I>C>Q

    ReplyDelete

Back to Top