20 May 2020

Bluetooth Bugs Allow Impersonation Attacks on Legions of Devices

According to security researchers, unpatched security bugs remain in Bluetooth chips from companies like Apple, Intel, Qualcomm, Samsung, and others, allowing for Bluetooth Impersonation Attacks (BIAS). Researchers found the vulnerabilities in Bluetooth Classic, allowing attackers to spoof paired devices, posing as a trusted endpoint. This then allows the attackers to

Read More
06 May 2020

Samsung patches 0-click vulnerability impacting all smartphones sold since 2014

Samsung released an update this week that patches a 0-click vulnerability that impacts all phones sold by the vendor since 2014. Google’s Project Zero bug-hunting team discovered the flaw, which lies in how the Android OS running on Samsung phones handles Qmage image format that is custom-made and supported on

Read More
09 Apr 2020

‘Fake Fingerprints’ Bypass Scanners with 3D Printing

New research from Cisco Talos has shown that 3D printed technology can bypass fingerprint scanners used in Apple, Samsung, and Microsoft products. 3D technology can create “fake fingerprints” that can bypass popular scanners, however, it remains costly and time-consuming to produce. Researchers tested the models on mobile phones including the

Read More
03 Mar 2020

iPhone, Pixel And Galaxy Smartphones Silently Compromised By $5 Hack

Samsung has reportedly joined iPhone and Pixel by introducing a new secure element chip to the Galaxy S20, bringing new hardware to the sensitive smartphone data storage party. However, Samsung, Apple, and Google are all being targeted by advanced hacking technology according to security researchers. A paper and supporting videos

Read More
27 Feb 2020

Billions of Devices Open to Wi-Fi Eavesdropping Attacks

A serious vulnerability in Wi-Fi chips manufactured by Broadcom and Cypress has been discovered. The flaw reveals communications from devices from Amazon, Google, Samsung, and others, allowing attackers to eavesdrop on Wi-Fi communications. The bug breaks the WPA2-Personal and WPA-2 Enterprise security protocols as it stems from the use of

Read More
04 Dec 2019

FBI warns about snoopy smart TVs spying on you

A recent FBI report warned that hackers could take control of an unsecured TV, gaining the ability to turn on the microphone and camera. Although this risk has been on the radar for some time, only a few cases of hackers using TVs to cyberstalk homes have been recorded. However,

Read More
14 Nov 2019

Gaping ‘hole’ in Qualcomm’s Secure World mobile vault leaked sensitive data

A hole found in the Qualcomm Secure World virtual processor that could be exploited to leak financial information has been patched and disclosed by researchers. Cybersecurity researchers at Check Point conducted a four-month study and concluded that it is not impossible to crack the Secure World operating system through fuzzing

Read More
14 Oct 2019

New Samsung Warning: Galaxy S10 Fingerprint Reader Hit By ‘Security Breach’

The in-display fingerprint reader in Samsung Galaxy S10 devices can easily be bypassed via a cheap gel protector manufactured by a third-party, a user recently discovered. In response, Samsung is warning customers to use only “Samsung authorized accessories, specifically designed for Samsung products.” The third-party gel protector was designed to

Read More
24 Jul 2019

Popular Samsung, LG Android Phones Open to ‘Spearphone’ Eavesdropping

Researchers with the University of Alabama at Birmingham and Rutgers University have developed a new attack enabling them to remotely access speakerphone audio streams on LG and Samsung phones. The attack, dubbed spearphone, takes advantage of the ability of accelerometers (motion sensors) present in vulnerable devices to record sound-wave reverberations

Read More
18 Jun 2019

Samsung TVs should be regularly virus-checked, the company says

On Monday, Samsung issued a Tweet informing customers who own one of its smart TVs that they should be scanning their device for malware every few weeks. The message, which also contained a short instructional video, was met with confusion by customers and cybersecurity experts alike. Many customers expressed frustration

Read More