Vulnerability in Samsung Galaxy S4 allows hacker to track emails and record communication data

Critical vulnerability in Samsung Galaxy S4 allows hacker to install a malicious code, track emails and record sensitive communication data.

vulnerability-in-samsung-galaxy-s4-allows-hackers-to-track-emails-and-record-communication-data-1

An Israeli security researcher Mordechai Guri, from Israel’s Ben-Gurion University has found critical vulnerability in Samsungs best-selling Galaxy S4 smartphone with Knox- security platform enable on it.

Security researcher told The Wall Street Journal that this vulnerability allows hackers to install malicious software on the phone which records all sorts of communication data and tracks emails.

Samsung has replied on the issue, saying that the company was looking in to the vulnerability but didn’t find it to be a serious threat as described by the Israeli security researcher. The company has promised to investigate the researcher’s claim in depth.

  • ‘’Samsung takes all security vulnerability claims very seriously, we promise to investigate the claims seriously, ‘’ however, the threat appears to be equivalent to some well-known attacks. Rest assured, the core Knox architecture cannot be compromised or infiltrated by such malware’’

Guri claims that he has found critical vulnerability in Samsung’s new security platform called Knox. It allows hackers to “easily intercept” the user data of Galaxy S4 smartphone with Knox- security platform enable on it.

The vulnerability can further be exploited and can be used to execute dangerous codes and modify data according to hacker’s command.

  • ‘’The new unveiled vulnerability presents a serious threat to all users of phones based on this architecture, such as users of the Samsung Galaxy S4.’’

Guri has come up with his research at a crucial time when Samsung is pitching the pentagon and other security agencies in U.S over Knox security platform.

U.S. Department of Defense has cleared its position in a statement that:

  • ‘’ Government will not comment on possible vulnerabilities, however, it will not allow use of a device until proven secure.’’

Total
0
Shares

Comments are closed.

Related Posts