Google Pixel can be hacked with a simple SIM card, install the update quickly


If you have a Google P smartphoneixel, we advise you to install the latest security patch urgently. Indeed, a very serious flaw was discovered by cybersecurity expert David Schütz. In a short video, this one shows that all it takes is a simple SIM card to access all of its user’s data.

Did you just buy a Pixel 7? Or does your old model still have a bright future ahead of it? In any case, it is better not to delay to install the latest security patch. Indeed, until recently, any beginner could unlock Google smartphones and thus access all the data they contain. All this without any manipulation worthy of the greatest hackers. A simple SIM card is enough.

We owe this spine-chilling information to cybersecurity expert David Schütz. In a video, available below, we see him performing a series of bad PIN codes with his Pixel 6, on the lock screen. After three unsuccessful attempts, the smartphone then requires a PUK code, which all dizzy people know well, since it allows you to unlock this kind of very disabling situation.

On the same subject — Android: a huge security flaw affects the Pixel 6 and Samsung Galaxy S22

Anyone Can Hack Your Google Pixel If You Don’t Update It

At this point, all you have to do is enter the famous PUK code for the Pixel to create a new PIN code. From then on, the smartphone does not require any password and is automatically unlocked, leaving the door open to any malicious individual. According to David Shütz, this problem is the direct consequence of a design choice on the part of Google.

The developer explains that the Mountain View company has created a security screen system that establishes an order of priority between the various barriers to unlocking: PIN code, fingerprint, PUK code, etc. The latter arriving on the screen, all the others are deactivated, because of lower priority. A small oversight that has fortunately been corrected in the latest security patch, available on Android 10, 11, 12, 12L and 13.



Source link -101