Google Assistant’s Ambient Mode turns Android devices into smart displays

Google wants to put your device to work even when it's charging or resting on a living room table or kitchen counter. Today at IFA, the company announced Ambient Mode for Google Assistant. The new feature will turn the latest Android devices into sma...

Google’s Pixel phones get lift-to-wake and double-tap features

Google's well-reviewed Pixel and Pixel XL are the Android phones to have right now, but they're still missing some much-liked features from the Nexus 6P and 5X. Namely, the models lack the "Moves" that let you double-tap or merely lift the phone to w...

Apple addresses lockscreen bypass bug with iOS 7.0.2 rollout

Apple confirmed and assured everyone that it was working on a fix to the iOS 7 lockscreen bypass bug last week that let sneaky individuals mess with users' email and social network accounts. And now, exactly seven days later, said update is hitting handsets in the form of iOS 7.0.2. Directly to the point, the update is said to "fi[x] bugs that could allow someone to bypass the lock screen passcode." And hey, there's also a Greek keyboard option for passcodes thrown into the update for good measure.

Filed under: , , ,

Comments

Via: 9 to 5 Mac

iOS 7 bug lets you call any number from a locked homescreen (video)

DNP iOS 7 buuuugs

You can expect three things every time a new iOS version comes along: fresh aesthetics, features and, by the looks of it, ways to bypass a locked screen. In iOS 7's case, this is the second security flaw unearthed since it's launched: An iPhone user named Karam Daoud recently discovered that you can dial any number on the Emergency call page from a locked homescreen. If you press the green phone button repeatedly after keying in a number, the screen turns black with an Apple logo, and the call goes through. We've tested it out on different devices, and while it doesn't work all the time, the point is that it sometimes does. There's no apparent way to disable Emergency calls, but Apple reportedly told Daoud it'll issue a patch later. We've reached out to Cupertino for a statement, and we'll inform you once we hear back.

Meanwhile, if you've been hearing about another supposed iOS 7 exploit that allows Siri to make calls, send text messages and post to social networks from a locked screen, don't worry too much. It's not actually a bug -- just go to Settings > General > Passcode Lock > Allow access when locked, then switch Siri off. After you do that, no mischievous sibling should be able to post embarrassing status updates on your Facebook account. That is, unless you do it yourself after a night of drunken revelry.

Filed under: , ,

Comments

Source: Forbes, BetaNews

Viber exploit lets attackers bypass Android lock screens, for now (video)

Viber exploit lets users bypass Android lock screens, a fix is on the way video

If you're an Android user who prefers Viber for VoIP and messaging, you may not want to leave your phone unattended in the near future. Bkav Internet Security has discovered an exploit that will bypass the lock screen on Android phones new and old (including the Nexus 4) as long as pop-up notifications are active. While the exact actions vary from phone to phone, all that's really needed is an incoming message or two, a handful of taps and the back button to reach the home screen. App users can disable the pop-ups as a short-term workaround, although they thankfully won't have to do that for long when Viber promises that a patch is on the way. There's only a small chance that a malicious attacker will both get their mitts on your phone and know that you've got Viber installed, but we'd advise against using statistical probability as a security measure.

Filed under: ,

Comments

Via: Ars Technica

Source: Bkav

Mobile Miscellany: week of March 25th, 2013

Mobile Miscellany week of March 25th, 2013

If you didn't get enough mobile news during the week, not to worry, because we've opened the firehose for the truly hardcore. This week, an unknown T-Mobile handset with Snapdragon 800 internals lit up the benchmarks, Sony was foiled at the lock screen and Rogers made 44 new promises without saying much at all. These stories and more await after the break. So buy the ticket and take the ride as we explore all that's happening in the mobile world for this week of March 25th, 2013.

Filed under: , , ,

Comments

Samsung’s Android phones affected by another lockscreen bypass, fix is in the works

Since lockscreen bypass methods are apparently what's hot in the streets, it's no surprise that yet another one has surfaced, this time targeting Samsung's Android phones. A variant of another, earlier uncovered method, this one does not fully unlock the phone by itself, but does provide access to apps and settings for a brief period. Given that, as demonstrated in the video by Terence Eden, it's possible to use Google Play to download an app to disable the locked screen and fully access the phone.

According to Terence, this problem is confirmed on the Galaxy Note II, possibly the Galaxy S III and potentially on other TouchWiz UI Samsung Android phones. Disabling screen animations under developer options should reduce the vulnerability, but doesn't eliminate it without switching to another ROM. He also mentions Samsung is aware of the issue and is working on a fix, but that leaves phones accessible right now. We've certainly seen enough of these recently (Apple's latest version of iOS has also been victimized again in the last day) to know leaving our phones out, locked or unlocked, is foolish. At the same time, if a manufacturer insists on adding customized software to the existing platform, it could at least have the courtesy to do so without causing security leaks -- check after the break for a "bonus" vid sent in by another tipster that shows a way to activate voice commands on a locked Galaxy S II.

Filed under: , , ,

Comments

Via: Rootzwiki

Source: Terence Eden Has A Blog

iOS 6.1.3 screen lock bypass uncovered (video)

Remember how yesterday's release of iOS 6.1.3 was supposed to fix a security hole that allowed one to bypass the lock screen? Well, turns out Apple's got a bit more work to do. Today, a new lock screen sidestep was revealed by YouTube user VideosdeBarraquito, and this time around, running iOS 6.1.3 won't do you any good. The bypass involves invoking a telephone call by voice command and then ejecting the SIM card at a specific event. After a few steps, access to a users contact list and photo gallery becomes easily accessible. The upside? If you're genuinely concerned about your security, you can plug this hole yourself by disabling the voice dial option from the Password Lock screen within system settings. You can view the complete exploit after the break. As for Apple, looks like it's back to the drawing board.

Filed under: , ,

Comments

Via: AllThingsD

Source: videosdebarraquito (YouTube)