The Sony Xperia Z becomes the latest smartphone afflicted with a security flaw, following in the footsteps of the iPhone, the Samsung Galaxy S3 and the Samsung Galaxy Note 2, all of which have recently dealt with lock screen security issues.
In the past few weeks, several big name smartphones have been revealed to have security flaws. First, it was the iPhone that was discovered to have a lock screen security flaw wherein users could bypass the pass code in order to access certain information like photos and contact info. Apple seemingly patched up the security issues with the release of iOS 6.1.3, though it appears that a lock screen issue for the iPhone 4 remains.
Shortly after, a security flaw was discovered on both the Galaxy S3 and the Galaxy Note 2 wherein users could access the entirety of both devices. Samsung says that it is aware of the issue but a permanent fix has not yet rolled out.
The latest device that has fallen victim to a lock screen security flaw is the Sony Xperia Z, a device that was released back in February to compete against the likes of the HTC One and the Samsung Galaxy S4.
The flaw, first noticed by GSMArena, is a quick and easy way to bypass the Sony Xperia Z’s lock screen in order to completely access the contents of the device. The process can be seen in the video below and it’s so easy, it can be done in a matter of seconds.
Sony is more than likely aware of the issue but it’s unclear when a patch might roll out. The company swiftly issued an update for the Sony Xperia Z to handle a “sleep of death” issue that plagued owners after the device launched so it could be that Sony acts quickly to plug up this security flaw that has been discovered on its new smartphone.
The Sony Xperia Z is Sony’s current flagship device and it comes with a 5-inch 1080p display, quad-core processor, 13MP camera, Android 4.1 Jelly Bean and more. Unlike many of the top tier smartphones of 2013, it’s not available on a carrier in the United States.
This article may contain affiliate links. Click here for more details.