Featured Articles

IHS teardown reveals Galaxy S5 BOM

IHS teardown reveals Galaxy S5 BOM

Research firm IHS got hold of Samsung’s new flagship smartphone and took it apart to the last bolt to figure out…

More...
Galaxy S5, HTC One M8 available selling well

Galaxy S5, HTC One M8 available selling well

Samsung’s Galaxy S5 has finally gone on sale and it can be yours for €699, which is quite a lot of…

More...
Intel lists Haswell refresh parts

Intel lists Haswell refresh parts

Intel has added a load of Haswell refresh parts to its official price list and there really aren’t any surprises to…

More...
Respawn confirms Titanfall DLC for May

Respawn confirms Titanfall DLC for May

During his appearance at PAX East panel and confirmed on Twitter, Titanfall developer Respawn confirmed that the first DLC pack for…

More...
KFA2 GTX 780 Ti Hall Of Fame reviewed

KFA2 GTX 780 Ti Hall Of Fame reviewed

KFA2 gained a lot of overclocking experience with the GTX 780 Hall of Fame (HOF), which we had a chance to…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Wednesday, 25 December 2013 09:20

Samsung’s super secure Knox software isn’t secure

Written by Fudzilla staff



Israeli researchers issue damning report

It appears that Samsung’s Knox security system is anything but secure. Samsung rolled out Knox in the hopes of attracting more security savvy consumers to the Galaxy S4.

Corporate users place an emphasis on security and for years BlackBerry was the king of the secure always-on market. Knox was expected to give Samsung a competitive edge and allow it to seize more BYOD market share.

However, a team of Israeli researchers from the Ben Gurion University of the Negev found that Knox does not live up to its name. The researchers identified a vulnerability that allows corporate data to leak through the secure container. In theory, it should be possible to inject malicious code from outside the container and compromise its integrity.

Hackers could then gain complete access to communications records, messages and emails. Worse, an infected phone could go on to infect other phones in a secure network.

The university stressed that the vulnerability is a serious threat and the team classified it as a “category one” vulnerability, which is as bad as it gets. The rating is reserved for vulnerabilities that enable remote attacks on secure networks.

blog comments powered by Disqus

To be able to post comments please log-in with Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments