Your internet-enabled Samsung Smart TV could be listening to everything you say, and sharing it with third parties.
With nearly 160,000 lust-ridden techies, corporate denizens and a few of us security types descending on a slightly crisp wintery Las Vegas to see what all the fuss is about at CES 2015, here are a few things to keep an eye out for this year at the show.
The Samsung Galaxy S5, Apple iPhone 5s and Google Nexus 5 were amongst handsets to be successfully hacked during the Mobile Pwn2Own hacking competition, reports Forbes.
One of the most popular and useful security functions of mobile handsets can be turned against the owner.
Investigadores han descubierto una falla de seguridad en el modo en que Viber, la popular aplicación de mensajería instantánea y llamadas, recibe imágenes, doodles y videos, así como también la forma en la que envía o recibe información de ubicación geográfica. También se ha detectado que Viber almacena información sin cifrado en sus servidores, y
Samsung has introduced fingerprint-scanning security as standard into its new flagship Galaxy S5 handset – with Finger Scanner offering secure shopping via Paypal direct from the handset in stores and websites, with a finger-swipe replacing passwords.
Android enthusiasts claim to have discovered a new vulnerability on Samsung smartphones that could allow an attacker to gain administrative access to the device through any installed app.
Yesterday I reported that Samsung laptops were infected with a keystroke logger. This certainly appeared to be the case as a Samsung supervisor reportedly confirmed (http://www.networkworld.com/newsletters/sec/2011/040411sec1.html) that Samsung shipped infected laptops. Samsung has since indicated that this is not the case. This incident has some very important lessons. My entire information supply was polluted and
[Final Update… I think – THERE WAS NO KEYSTROKE LOGGER please see http://blog.eset.com/2011/03/31/samsung-and-i-got-bit-by-a-vipre to find out what happened.] [Update – There will be a new blog about this incident. I relied upon the information at http://www.networkworld.com/newsletters/sec/2011/040411sec1.html that Samsung had confirmed the presence of the keystroke logger in asserting that the laprops were infected. Since then