Feeds

Fandroids at pranksters' mercy: Android remote password reset now live

Google says 'don't be evil', but it never said we couldn't be mischievous

Gartner critical capabilities for enterprise endpoint backup

Android users can now lock their handsets from afar as Google enables what looks like the perfect feature for office pranksters.

Making a lost Android handset ring and wiping all the data on a stolen device have been standard features in the advertising giant's mobile operating system for a while. Now, however, a mislaid Android handset can have a new password set remotely for when one's phone temporarily falls into the wrong hands.

This device password-reset feature must be accessed via Google Play: thus, if you leave a PC or such a machine lying around while logged into the Play store, some wag can sneak over and now kick you out of your gadget. At least it's better than deleting all of your files.

The reset-password-and-lock functionality was widely anticipated, but fan website Android Police noticed that it has this week arrived in the Device Manager available from the Google Play website.

The lock and remote wipe actions only work after they have been enabled in the "Google Settings" app (Android Device Manager > Allow Remote Lock), and one has to be logged into the Google Play account associated with the device before it's possible to activate these features.

But once you're in, the service immediately zooms into the tracked gadget's location and offers all three management options: ring, lock with new password, and erase.

The screen

It's pretty primitive by modern enterprise systems, but enough for the distraught mugging victim who remembers that his passwords for Amazon, Facebook and the office network are all cached in the mobile browser - and thus needs the handset's data deleted pronto.

Remote wipe takes care of that scenario, though, and it's a bit of a struggle to imagine where one would want to remotely change the password of an Android device. If one has forgotten the unlock pattern then it might prove useful – and it's a goldmine for the prankster who comes across a desktop computer left logged into Google. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Raspberry Pi B+: PHWOAR, get a load of those pins
More USB ports than your laptop? You'd better believe it...
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Apple's iWatch? They cannae do it ... they don't have the POWER
Analyst predicts fanbois will have to wait until next year
Super Cali signs a kill-switch, campaigners say it's atrocious
Remote-death button bad news for crooks, protesters – and great news for hackers?
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.