Why Using Pattern Locks to Protect Your Smartphone Is Not Entirely Safe

Share and earn Cybytes
Facebook Twitter LinkedIn Email

When it comes to smartphone security, one of the first things that we recommend is to switch on the screen lock feature. A surprisingly large number of people are still using their phones without any kind of screen lock enabled and this is a major security loophole that leaves their devices and data open to thieves. In case of loss or theft of such devices, it is very simple then for a malicious party to access the phone and view or steal any data that he likes.

The different options available for locking the screen of a device are as follows, and all major smartphone manufacturers today provide these features.

  • Password – High security
  • PIN – Medium to high security
  • Fingerprint recognition – Medium to high security
  • Pattern – Medium security
  • Face and voice – Low security
  • Face unlock – Low security

A majority of people who do use the screen lock feature opt for the PATTERN functionality. This method of unlocking devices is fun, interactive and anyone who sets it up thinks it is pretty unique as well. However, the truth is that the pattern chosen by many people may not be that unique after all.

It has been discovered that the traces and patterns that we form for unlocking our phones are usually pretty easy to guess. At a recent PasswordsCon conference in Las Vegas, a Norwegian University of Science and Technology investigator showcased a study about these locking patterns and how little security they provide. Marte Løge, the investigator, studied around 4,000 user patterns to arrive at her conclusions.

Notable Findings of Pattern Locking

  1. In the 3×3 grid for setting the pattern, a maximum of 9 point traces can be used. But most people use much lesser.
  2. A majority of people only use four swipes for setting their pattern and this limits the total possible combinations to 1624.
  3. Around 44% of people start their patterns in the top-left corner. Moreover, 77% of patterns start in any one of the four corners.
  4. The pattern is also likely to go from left to right and from top to bottom. All these factors further reduce the number of possible combinations and this makes it easier for attackers to guess the potential patterns.

Some of the most common patterns that were seen to be used are as follows. So if you are using any of these as your screen lock patterns, it is highly recommended that you change it as soon as possible.

Furthermore, we also recommend that you use the PASSWORD feature to unlock your smartphone. It goes without saying that the password you choose should be a strong one as well. It should consist of at least eight characters; have at least one number, at least one CAPITAL alphabet and at least one special character. This will make your smartphone close to impossible to unlock even if someone does get their hands on it.


The post Why Using Pattern Locks to Protect Your Smartphone Is Not Entirely Safe appeared first on Cybersponse.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About CyberSponse, Inc.
CyberSponse Incorporated, a global leader in cyber security automation & orchestration, helps accelerate an organization’s processes, security operations teams and incident responders. The CyberSponse platform enables organizations to seamlessly integrate, automate and playbook their security tool stack, enabling better, faster and more effective security operations. With a global presence, offering an enterprise platform, Cybersponse enables organizations to secure their security operations teams and environments.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?