Thursday, September 19, 2013

Reuters: Technology News: Hackers eager to crack fingerprint scanner on iPhone 5S

Reuters: Technology News
Reuters.com is your source for breaking news, business, financial and investing news, including personal finance and stocks. Reuters is the leading global provider of news, financial information and technology solutions to the world's media, financial institutions, businesses and individuals. // via fulltextrssfeed.com 
Refresh your vocabulary.

Learn a new word everyday by subscribing to Word of the Day. A great tool if you're studying for the GRE, GMAT or LSAT, or simply want to enhance your lexicon.
From our sponsors
Hackers eager to crack fingerprint scanner on iPhone 5S
Sep 19th 2013, 19:41

The exploded view of the home button which doubles as a fingerprint sensor is seen on an image of the new iPhone 5S at Apple Inc's media event in Cupertino, California September 10, 2013. REUTERS/Stephen Lam

The exploded view of the home button which doubles as a fingerprint sensor is seen on an image of the new iPhone 5S at Apple Inc's media event in Cupertino, California September 10, 2013.

Credit: Reuters/Stephen Lam

By Jim Finkle

BOSTON | Thu Sep 19, 2013 3:36pm EDT

BOSTON (Reuters) - Hackers are gearing up for Friday's release of the iPhone 5S, aiming to be the first to crack the device's first-ever fingerprint scanner, a security feature that Apple Inc hopes will set the new model apart from the competition.

To sweeten the contest, a group of security researchers and a micro venture capital firm have pitched to offer a prize to the hacker who breaks through ahead of the rest. The booty, promoted on the website (istouchidhackedyet.com/), includes more than $13,000 in cash, bottles of bourbon and tequila, and other prizes.

Among those hoping to win the prizes -- and the glory of uncovering potential flaws so Apple can then fix them -- is David Kennedy, a former U.S. Marine Corps cyber-intelligence analyst who did two tours in Iraq and now runs his own consulting firm, TrustedSec LLC.

"I am just waiting to get my hands on it to figure out how to get around it first," the founder of the DerbyCon hacking conference told the Thomson Reuters Global Markets Forum this week. "I'll be up all night trying."

The fingerprint scanner on the top-of-the-line iPhone lets users unlock their devices or make purchases on iTunes by simply pressing their finger on the home button. It has been hailed as a major step in popularizing the use of biometrics in personal electronics.

Security experts worry about the implications of using the module to grant access to sensitive data on the phone and potentially enabling mobile purchases.

Security engineer Charlie Miller, known in hacking circles for uncovering major bugs in the iPhone as well as circumventing security in Apple's App Store, said it could take fewer than two weeks for Kennedy or some other smart hacker to get around the new lock.

Once they're in, they could gain access to the cornucopia of data typically stored on a user's iPhone and might potentially be able to buy goods from iTunes and Apple's App store.

Apple declined to comment for this article.

NOTHING WRONG...

To be sure, experts say they know of nothing intrinsically wrong with Apple's fingerprint reader, based on what the company has so far disclosed. Reviewers this week gushed over its ease of use and reliability.

The reader's sapphire crystal sensor is embedded in the phone's home button and reviews the fingerprint as a user touches it to verify his or her identity. It can be used to approve purchases of music, videos and other goods.

Data used for verification is encrypted and stored in a secure enclave of the phone's A7 processor chip. No information is sent to any remote servers, including Apple's iCloud system.

HD Moore, a well-known hacking expert and chief researcher with the security software maker Rapid7, said such protections mean "the bar is a little bit higher," but that certainly won't discourage hackers from trying to break the new technology.

"This is definitely something to target and something people will want to go after," he said.

Apple shouldn't take hackers' enthusiasm personally.

All major electronics products are subjected to similar scrutiny as new features are rolled out, including devices from Google Inc, Microsoft Corp and Samsung Electronics Co.

For example, in 2012, Charlie Miller led a team that demonstrated techniques for taking over smartphones running Google's Android software through their use of near-field communications, or NFC, a wireless technology used for sharing data or making purchases at point-of-sales terminals.

Bugs are often disclosed by "white hats," or hackers who unearth flaws and report them so manufacturers can repair them, preventing criminal exploitation. The hope is the good guys find them before "black hats" uncover them for nefarious purposes.

White hats have found multiple security issues with iPhones, iPads and in the App store since Apple launched its first smartphone in 2007. They say that scrutiny has helped make it one of the most secure devices on the market today.

Apple executives said at last week's iPhone launch that the new fingerprint reader, dubbed Touch ID, will help make phones far more secure by dint of its ease of use.

About half of all smartphone users don't bother to use current screen-locking technology because of the inconvenience of keying in multiple-digit passwords. Apple is betting users may be far more willing to avail themselves of a solution that requires a single finger-swipe.

"The technology within Touch ID is some of the most advanced hardware and software we put in any device," Dan Riccio, senior vice president of hardware engineering, said at the event.

Kennedy said he needs to examine the new iPhone to figure out how to best attempt an attack.

He said his choices include hacking the software that analyzes the fingerprint data, or physically opening up the phone and connecting it to a custom-built device that would impersonate Apple's fingerprint reader.

He added that it might be possible to lift a user's fingerprint from elsewhere on the device and somehow make a clone of it.

Rich Mogul, an analyst with the security research firm Securosis, said he planned to use it and expects it to be widely adopted despite the fact that hackers are circling.

"Nobody has gotten their hands on it to see what the weaknesses are and how easy it is to crack," Mogul said.

"We'll have to wait to see."

(Editing by Edwin Chan and Andrew Hay)

  • Link this
  • Share this
  • Digg this
  • Email
  • Reprints

You are receiving this email because you subscribed to this feed at blogtrottr.com.

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions

0 comments:

Post a Comment

 
Great HTML Templates from easytemplates.com.