Featured Articles

KitKat has more than a fifth of Android users

KitKat has more than a fifth of Android users

Android 4.4 is now running on more than a fifth of Android devices, according to Google’s latest figures.

More...
Nvidia introduces five new Quadro cards

Nvidia introduces five new Quadro cards

Nvidia has revamped its Quadro professional graphics line-up with a total of five new cards, two of which are based on…

More...
AMD Tonga XT graphics cards come later

AMD Tonga XT graphics cards come later

According to sources who wish to remain unnamed, we should see an AMD Tonga XT-based graphics card launched sometime in September.

More...
Nvidia Maxwell Geforce 800 comes in September

Nvidia Maxwell Geforce 800 comes in September

Nvidia was always cautious when talking about upcoming Maxwell parts, the first of which was launched back in March and based…

More...
Aerocool Dead Silence reviewed

Aerocool Dead Silence reviewed

Aerocool is well known for its gamer cases with aggressive styling. However, the Dead Silence chassis offers consumers a new choice,…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Wednesday, 25 December 2013 09:20

Samsung’s super secure Knox software isn’t secure

Written by Fudzilla staff



Israeli researchers issue damning report

It appears that Samsung’s Knox security system is anything but secure. Samsung rolled out Knox in the hopes of attracting more security savvy consumers to the Galaxy S4.

Corporate users place an emphasis on security and for years BlackBerry was the king of the secure always-on market. Knox was expected to give Samsung a competitive edge and allow it to seize more BYOD market share.

However, a team of Israeli researchers from the Ben Gurion University of the Negev found that Knox does not live up to its name. The researchers identified a vulnerability that allows corporate data to leak through the secure container. In theory, it should be possible to inject malicious code from outside the container and compromise its integrity.

Hackers could then gain complete access to communications records, messages and emails. Worse, an infected phone could go on to infect other phones in a secure network.

The university stressed that the vulnerability is a serious threat and the team classified it as a “category one” vulnerability, which is as bad as it gets. The rating is reserved for vulnerabilities that enable remote attacks on secure networks.

blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments