Featured Articles

Analyst reveals Apple Watch spec

Analyst reveals Apple Watch spec

An analyst has examined the Apple Watch supply chain in an effort to ascertain the exact spec of Cupertino’s new gadget…

More...
Nvidia's first 20nm product is a mobile SoC

Nvidia's first 20nm product is a mobile SoC

For much of the year we were under the impression that the second generation Maxwell will end up as a 20nm…

More...
Nvidia GTX 980 reviewed

Nvidia GTX 980 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Nvidia adjusts GTX 980 and GTX 970 pricing

Nvidia adjusts GTX 980 and GTX 970 pricing

It appears that Nvidia has been feeling the pulse of the market and took some note from comments regarding the original…

More...
PowerColor TurboDuo R9 285 reviewed

PowerColor TurboDuo R9 285 reviewed

Today we will take a look at the PowerColor TurboDuo Radeon R9 285. The card is based on AMD’s new…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Wednesday, 25 December 2013 09:20

Samsung’s super secure Knox software isn’t secure

Written by Fudzilla staff



Israeli researchers issue damning report

It appears that Samsung’s Knox security system is anything but secure. Samsung rolled out Knox in the hopes of attracting more security savvy consumers to the Galaxy S4.

Corporate users place an emphasis on security and for years BlackBerry was the king of the secure always-on market. Knox was expected to give Samsung a competitive edge and allow it to seize more BYOD market share.

However, a team of Israeli researchers from the Ben Gurion University of the Negev found that Knox does not live up to its name. The researchers identified a vulnerability that allows corporate data to leak through the secure container. In theory, it should be possible to inject malicious code from outside the container and compromise its integrity.

Hackers could then gain complete access to communications records, messages and emails. Worse, an infected phone could go on to infect other phones in a secure network.

The university stressed that the vulnerability is a serious threat and the team classified it as a “category one” vulnerability, which is as bad as it gets. The rating is reserved for vulnerabilities that enable remote attacks on secure networks.

blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments