Samsung

Flaws in ‘Find My Mobile’ exposed Samsung phones to hack

A researcher found multiple flaws in Samsung’s Find My Mobile that could have been chained to perform various malicious activities…

4 years ago

Samsung leaked data of a few UK Customers

The South Korean multinational conglomerate Samsung announced that customers’ personal information was leaked online due to a “technical error” Samsung…

4 years ago

Apple and Samsung fined millions for “planned obsolescence” of old smartphones

Italian Competition Authority AGCM fined Apple and Samsung a 5 million Euros and 10 million Euros for “planned obsolescence” of their mobile devices.…

6 years ago

A Samsung Texting App bug is sending random photos to contacts

Some Samsung devices are randomly sending photos taken with the camera to contacts in the address book without permission. Do…

6 years ago

Hackers can exploit flaws in Samsung Smart Home to access your house

Security researchers have discovered multiple flaws in the Samsung Smart Home automation system that could be exploited by remote attackers.…

8 years ago

Chinese Hackers Breached LoopPay for cyber espionage through Samsung Pay

Chinese Hackers who allegedly compromised servers at LoopPay, the Samsung subsidiary, appear interested in spying on targets through Samsung Pay…

9 years ago

Samsung smart fridge opens Gmail login to hack

At the recent DEF CON hacking conference penetration testers demonstrated that  Samsung smart fridge leaves Gmail logins open to attack.…

9 years ago

Be aware Samsung disable Windows Update to run its bloatware

The security researcher Patrick Barker discovered that Samsung is disabling Windows Update to run its own bloatware opening users to…

9 years ago

More than 600 million Samsung S devices open to hack

More than 600 million Samsung S devices could be opened to cyber attacks because a flaw in the validation of…

9 years ago

Samsung smartTVs don’t encrypt voice and text data

Samsung smartTV send unencrypted voice recognition data and text information across the Internet without encrypt it, allowing hackers to capture…

9 years ago

This website uses cookies.