Categories: NewsVideo

Sony Xperia Z Bug Lets You Bypass Device Lock Screen

The Lock screen on your Xperia Z may not be that secure because someone has discovered a way to bypass it and gain access to your device without knowing your passcode or PIN.

The video after the jump shows you how the lock screen can be defeated. It looks simple enough and we’ve tried it on our Xperia Z and it work. The thing is, you’re not going to get it right the first time. Also, the bypass is not consistent. It works sometimes and other times it does nothing. On top of that there’s also the rather lengthy bypass code that you need to memorise.

So should you be worried if you own an Xperia Z. Not really, like anyone who owns a smartphone out there, just always be careful. No phone is ironclad and the only way to really protect your data from prying eyes is to make sure that you don’t lose it.

[via]

Recent Posts

Zeekr 7X 2026 gets a price hike in Malaysia: Still cheaper than Tesla Model Y

Zeekr Malaysia has announced the new 2026 pricing for the Zeekr 7X, following the end…

1 day ago

Vivo X300 Pro: Forget the iPhone and Galaxy, this is the Real Concert Phone

When it comes to choosing a smartphone with the best camera, most people instinctively look…

1 day ago

Tesla Model 3 and Model Y now listed with up to 55km more range

Tesla has quietly revised the advertised WLTP-rated range for several Model 3 and Model Y…

1 day ago

Tune Talk app offers free games and drama worldwide with no SIM or subscription required

Tune Talk has expanded access to its revamped Tune Talk app globally, allowing users worldwide…

1 day ago

Maxis migrates mission-critical workloads, including Maxis and Hotlink apps, to AWS Malaysia Region

Maxis has completed the migration of its mission-critical workloads from Amazon Web Services’ Singapore Region…

1 day ago

Dongfeng 007 zooms into Malaysia: Electric sedan with up to 536hp, priced from RM161k

In addition to the Vigo compact SUV, Dongfeng's EV lineup in Malaysia now also includes…

2 days ago

This website uses cookies.