<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet title="XSL_formatting" type="text/xsl" href="https://news.samsung.com/au/wp-content/plugins/btr_rss/btr_rss.xsl"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
	<channel>
		<title>Cyber Security &#8211; Samsung Newsroom Australia</title>
		<atom:link href="https://news.samsung.com/au/tag/cyber-security/feed" rel="self" type="application/rss+xml" />
		<link>https://news.samsung.com/au</link>
        <image>
            <url>https://img.global.news.samsung.com/image/newlogo/logo_samsung-newsroom_au.png</url>
            <title>Cyber Security &#8211; Samsung Newsroom Australia</title>
            <link>https://news.samsung.com/au</link>
        </image>
        <currentYear>2026</currentYear>
        <cssFile>https://news.samsung.com/au/wp-content/plugins/btr_rss/btr_rss_xsl.css</cssFile>
		<description>What's New on Samsung Newsroom</description>
		<lastBuildDate>Thu, 02 Apr 2026 13:11:26 +0000</lastBuildDate>
		<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
					<item>
				<title>[Editorial] Leading the Way in Enterprise Mobile Security: Samsung’s Zero Trust Strategy</title>
				<link>https://news.samsung.com/au/editorial-leading-the-way-in-enterprise-mobile-security-samsungs-zero-trust-strategy?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Wed, 28 Jan 2026 09:00:21 +0000</pubDate>
						<category><![CDATA[B2B]]></category>
		<category><![CDATA[Editorials]]></category>
		<category><![CDATA[Mobile & wearables]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Samsung Knox]]></category>
                <guid isPermaLink="false">https://bit.ly/46fnDfP</guid>
									<description><![CDATA[&#160; Today’s world is full of unprecedented innovations and rapidly evolving technologies. It’s an era of endless possibilities, coupled with a new set of]]></description>
																<content:encoded><![CDATA[<p><img class="alignnone size-large wp-image-7477" src="https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/001-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-1024x683.jpg" alt="" width="1024" height="683" srcset="https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/001-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-1024x683.jpg 1024w, https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/001-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-845x563.jpg 845w, https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/001-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-768x512.jpg 768w, https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/001-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody.jpg 1440w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>&nbsp;</p>
<p>Today’s world is full of unprecedented innovations and rapidly evolving technologies. It’s an era of endless possibilities, coupled with a new set of risks for security and privacy. At Samsung Electronics, we recognise that as we enter these uncharted territories, we must be prepared for the ever-changing security landscape and champion a dynamic approach to enterprise security.</p>
<p>&nbsp;</p>
<p>The cybersecurity threats of today affect everyone, from consumers to businesses. Enterprise device fleets must be resilient— from suspicious URLs, insider employee threats and malware, to emerging risks associated with AI usage in the workplace, including sensitive data leaks. As a growing number of employees across industries — from corporate offices to the frontlines — use devices to access enterprise networks and resources, there are increased security risks that may also lead to a substantial financial toll on businesses.</p>
<p>&nbsp;</p>
<p>Enterprise security incidents can arise across operations. However, the <span><a href="https://www.idc.com/" target="_blank" rel="noopener">International Data Corporation</a></span> (IDC)<a href="#_ftn1" name="_ftnref1"><span>[1]</span></a> found that an overwhelming 70 percent of successful breaches originate from endpoints — the devices that connect to networks like phones, laptops and tablets. Unfortunately, in today’s security operations landscape, IT administrators have much less visibility into mobile devices compared to PCs and servers. With mobile devices now being the most common method of employee network access, this has to change. A systematic, comprehensive approach is critical to ensuring seamless mobile capabilities and a enhanced way of protection. At Samsung, we’re setting a new standard for mobile enterprise security by committing to a collaborative Zero Trust strategy for endpoints in partnership with market leaders.</p>
<p>&nbsp;</p>
<p><img class="alignnone size-large wp-image-7478" src="https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/002-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-1024x683.jpg" alt="" width="1024" height="683" srcset="https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/002-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-1024x683.jpg 1024w, https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/002-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-845x563.jpg 845w, https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/002-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-768x512.jpg 768w, https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/002-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody.jpg 1440w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>&nbsp;</p>
<h3><strong>Core Principles for Endpoint Security</strong></h3>
<p>Samsung’s legacy of innovation is built upon our deep understanding of users. We’re constantly listening to feedback from consumers and businesses, anticipating the evolution of mobile technology. This is what enables us to develop industry-first solutions for consumers and businesses alike. As the Head of the Global Mobile B2B Team, I’m especially proud of how we’ve led the way in critical areas that deliver value to enterprises across the board. From advancing hardware-backed device attestation and threat detection to fully embracing the security principles, we are constantly striving to provide our customers with mobile devices and solutions that exceed their security requirements.</p>
<p>&nbsp;</p>
<p>Zero Trust is a security framework that continuously assesses security, risk and trust levels based on context. The current security solutions market is dominated by network-centric Zero Trust solutions that focus on securing access at the <em>network edge</em>. Unfortunately, this approach by itself neglects a critical blind spot: the <em>endpoint</em>. Endpoints have the largest attack surface and are the most challenging IT assets to protect against cyberattacks. In most cases, they are the most vulnerable points in an organization’s IT ecosystem.</p>
<p>&nbsp;</p>
<p>Zero Trust principles for endpoints, when realised correctly, ensure that access requests from endpoints are handled based on context that correlates with the device’s security and the user’s needs, and are continuously verified in real time. Although there is no definitive list of core principles behind Zero Trust endpoint protection, the following principles are the most commonly adopted:</p>
<p>&nbsp;</p>
<ul>
<li><strong>“Never trust, always verify” approach for devices:</strong> Devices should no longer be implicitly trusted just because they are within the network boundary. Instead, each device needs to be verified prior to being granted access.</li>
<li><strong>Continuous risk assessment and enforcement:</strong> Endpoint protection must be agile and ready to adapt to constantly changing risk conditions. This means continuously evaluating context — such as location, time of access and the device’s security— and adjusting security policies accordingly. Suspicious activity needs to be addressed through enforcement actions such as access restrictions or complete isolation.</li>
<li><strong>Restricted privileges and narrowly scoped access:</strong> Endpoints must enforce access control in real time based on context while ensuring privileges are granted dynamically with a narrow scope.</li>
<li><strong>Incorporation of user identity, device security and behavioral signals:</strong> A Zero Trust-compliant solution needs to make granular and informed trust decisions to enforce tight access controls. To enable such decisions, Zero Trust’s continuous evaluation of context integrates user identity, device security and behavioral signals.</li>
</ul>
<p>&nbsp;</p>
<p>While the Zero Trust security strategy is growing in adoption, Samsung is fully embracing it. By doing so, we are helping to protect the most vulnerable points in an organisation’s IT landscape. Risks related to endpoint security are constantly increasing as cloud-based applications, Bring Your Own Device (BYOD) programs and remote work prevail in the modern workplace environment. Samsung recognises the critical nature of this problem and is proactively addressing it in collaboration with partners.</p>
<p><strong> </strong></p>
<p>&nbsp;</p>
<p><img class="alignnone size-large wp-image-7479" src="https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/003-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-1024x683.jpg" alt="" width="1024" height="683" srcset="https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/003-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-1024x683.jpg 1024w, https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/003-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-845x563.jpg 845w, https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/003-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-768x512.jpg 768w, https://img.global.news.samsung.com/au/wp-content/uploads/2026/01/003-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody.jpg 1440w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>&nbsp;</p>
<h3><strong>Innovation and Collaboration for Security at Every Level</strong></h3>
<p>How does this work in practice? From the hardware level and all the way to the operating system and security interface, Zero Trust security principles are built into the architecture of Samsung Galaxy devices, enhancing protection at every layer while intuitively integrating with a business’s existing security infrastructure. Together, these practices empower enterprises to administer security threat detection and provide  more reliable responses.</p>
<p>&nbsp;</p>
<p>At Samsung, we recognise that <span><a href="https://www.samsungmobilepress.com/feature-stories/editorial-there-is-no-privacy-without-stronger-security-thats-why-were-joining-forces-with-the-security-community-to-keep-you-safe" target="_blank" rel="noopener">security is a collective effort</a></span>. It is only through open collaboration with partners that we can bring the most advanced solutions to our customers. In my time at Samsung, we’ve made extensive strides in bringing forth versatile, optimised and secure solutions<a href="#_ftn2" name="_ftnref2"><span>[2]</span></a> for enterprises of all kinds.</p>
<p>&nbsp;</p>
<p>In 2024, we integrated Samsung Knox<a href="#_ftn3" name="_ftnref3"><span>[3]</span></a> — our multilayer security management platform — with Cisco Secure Access, an innovative Security Service Edge solution. <span><a href="https://www.samsungknox.com/en/blog/samsung-cisco-collaboration" target="_blank" rel="noopener">This collaboration</a></span> delivers a secure and flexible employee access experience, enabling organisations to verify user identity, device security and context before granting access.</p>
<p>&nbsp;</p>
<p>We also have a strong partnership with Microsoft, defined by a shared vision of reimagining mobile device security for business customers. The <span><a href="https://www.samsungmobilepress.com/press-releases/samsung-and-microsoft-unveil-first-on-device-attestation-solution-for-enterprise" target="_blank" rel="noopener">first step</a></span> of this strategic plan began in 2023, when we integrated Samsung Knox with Microsoft Intune, creating an on-device mobile hardware-backed device = solution that works equally well on both company and personal devices. This solution <span><a href="https://www.samsungknox.com/en/blog/samsung-knox-on-device-attestation-now-default-in-microsoft-intune" target="_blank" rel="noopener">is now enabled by default in all new Android App Protection Policies</a></span>, empowering organisations to bolster the security of all Samsung devices in their fleet. In yet another step forward in our partnership with Microsoft, Samsung offers a direct-to-security operations center (SOC) connector. This was achieved through the <span><a href="https://www.samsungknox.com/en/blog/knox-asset-intelligence-for-microsoft-sentinel" target="_blank" rel="noopener">integration of Knox Asset Intelligence and Microsoft Sentinel</a><a href="#_ftn4" name="_ftnref4"><span>[4]</span></a></span>, a scalable, cloud-native security information and event management (SIEM) solution. This integration delivers unprecedented visibility into mobile security threats, providing centralised monitoring and protection across enterprise device fleets.</p>
<p>&nbsp;</p>
<p>Working together with partners, Samsung is addressing key challenges in multiple areas — securing mobile devices, minimising damage from potential cyber threats and empowering employees to work efficiently and effectively, reducing concerns for security.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><strong>Holistic Security for Enhanced Privacy</strong></h3>
<p>We’re constantly innovating, refining and developing <span><a href="https://www.samsungmobilepress.com/press-releases/samsung-knox-native-solution-sets-a-new-standard-in-secure-communications-for-governments-and-enterprises" target="_blank" rel="noopener">Samsung Knox solutions</a></span> in order to bring our customers enhanced control, greater transparency and better protection against cyber threats.</p>
<p>&nbsp;</p>
<p><span><a href="https://www.samsungknox.com/en/blog/enabling-uncompromising-security-for-every-zero-trust-journey" target="_blank" rel="noopener">By embodying Zero Trust as a core pillar of Samsung Knox</a></span>, every measure is being taken to help secure mobile devices and data.</p>
<p>&nbsp;</p>
<p>As threats become increasingly complex with AI and hyperconnectivity taking center stage, security and privacy are more important now than ever before. Today’s business landscape is constantly being threatened by an increasing volume of cyberattacks that aim to exploit IT vulnerabilities, with mobile devices and other endpoints quickly becoming prime targets.</p>
<p>&nbsp;</p>
<p>That’s why Samsung is working with market-leading companies to provide security solutions that work seamlessly with existing infrastructure, offering increased end-to-end protection. These collaborative solutions are a testament to our commitment to not only adhere to industry standards but to also drive their continued development when it comes to Zero Trust endpoint security. This is just the beginning.</p>
<p>&nbsp;</p>
<p>To learn more about Samsung Knox’s approach to mobile security, visit <span><a href="https://www.samsungknox.com/en/secured-by-knox" target="_blank" rel="noopener">samsungknox.com</a></span>.</p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a> <em>The Hacker News</em>, “<span><a href="https://thehackernews.com/2024/04/10-critical-endpoint-security-tips-you.html">10 Critical Endpoint Security Tips You Should Know</a></span>,” April 26, 2024 (reporting IDC data)</p>
<p><a href="#_ftnref2" name="_ftn2"><span>[2]</span></a> Cisco Secure Access, Microsoft Intune and Microsoft Sentinel are third-party solutions and paid offerings.</p>
<p><a href="#_ftnref3" name="_ftn3"><span>[3]</span></a><span> Samsung Knox Vault availability may vary by model including but not limited to Galaxy S Series, Galaxy A Series, Galaxy Tab S Series and more.</span></p>
<p><a href="#_ftnref4" name="_ftn4"><span>[4]</span></a> Knox Asset Intelligence is a paid offering available through Knox Suite Plans.</p>
]]></content:encoded>
																				</item>
					<item>
				<title>Your Privacy, Secured: How Knox Vault Protects You in the Era of AI</title>
				<link>https://news.samsung.com/au/your-privacy-secured-how-knox-vault-protects-you-in-the-era-of-ai?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Mon, 23 Jun 2025 09:26:47 +0000</pubDate>
						<category><![CDATA[Mobile & wearables]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Galaxy]]></category>
		<category><![CDATA[Galaxy AI]]></category>
		<category><![CDATA[Knox]]></category>
		<category><![CDATA[Knox Matrix]]></category>
		<category><![CDATA[Knox Vault]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Samsung Knox]]></category>
		<category><![CDATA[Samsung Knox Matrix]]></category>
		<category><![CDATA[Samsung Knox Vault]]></category>
		<category><![CDATA[Security]]></category>
                <guid isPermaLink="false">https://bit.ly/4k4qyw7</guid>
									<description><![CDATA[Galaxy AI[1] is built to understand what you need before you even ask, whether that’s suggesting a change in your routine or pulling up just the right]]></description>
																<content:encoded><![CDATA[<p><strong>Galaxy AI<a href="#_ftn1" name="_ftnref1"><span>[1]</span></a></strong> is built to understand what you need before you even ask, whether that’s suggesting a change in your routine or pulling up just the right information at the right time.</p>
<p>&nbsp;</p>
<p>This level of personalisation can be incredibly helpful, but the more your phone knows, the more there is to protect. So, what’s keeping all that personal data secure?</p>
<p>&nbsp;</p>
<p>Samsung believes there is no privacy without strong security. That’s why every Galaxy device is protected from the chip up by a multi-layered approach, which includes <span><a href="https://www.samsungmobilepress.com/feature-stories/the-knox-journals-stay-in-control-of-your-security-your-data-used-exactly-how-you-see-fit">on-device</a></span> personalisation, user-controlled cloud processing, and ecosystem-wide protection through Samsung <span><a href="https://www.samsungmobilepress.com/press-releases/samsung-one-ui-7-enhances-security-and-privacy-in-the-age-of-ai-giving-users-greater-transparency-and-choice/">Knox Matrix</a></span>.</p>
<p>&nbsp;</p>
<p>At the core of this system is Samsung <span><a href="https://www.samsungmobilepress.com/feature-stories/samsung-brings-next-level-security-to-galaxy-s21-series-with-samsung-knox-vault">Knox Vault</a></span><a href="#_ftn2" name="_ftnref2"><span><u>[2]</u></span></a>, Samsung’s hardware-based solution for your most sensitive information.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><strong>Secured at the Hardware Level</strong></h3>
<p>&nbsp;</p>
<p>Most devices rely on software alone to guard sensitive data, but Galaxy devices go further.</p>
<p>&nbsp;</p>
<p>Knox Vault is a hardware-level security solution that creates a physical barrier between your most private information and everything else. It works like a locked room inside your phone, with its own processor and memory. It pairs a secure processor with dedicated memory, isolating your passwords, PINs, biometrics, and cryptographic keys. These are the kinds of details you don’t want anyone else to access, and Knox Vault is built to make sure they stay private. You don’t need to activate or manage it, it’s always on, working silently in the background, helping keep your data safe while you get on with your day.</p>
<p>&nbsp;</p>
<p>This is particularly crucial in the age of AI as user concerns are expanding from traditional cybersecurity threats, like viruses and malware, to worries over leaking personal data, such as conversations with your AI assistant. And as AI becomes part of more everyday tasks, the types of data that need protection are also expanding.</p>
<p>&nbsp;</p>
<p>For example, location service metadata from your personal photos, not only details the resolution and file format, but could easily give away where you live and the exact location where the image was taken. In the era of AI, personal information like your address, face clustering ID, person ID, pet type, scene type and more need to encrypted and stored in a safe location. These things aren’t just files — they are deeply connected to your daily life.</p>
<p>&nbsp;</p>
<p>Knox Vault helps mitigate these growing concerns by safely storing personal information in a secure, hardware-isolated environment designed to block both physical tampering and remote attacks ensuring your data can’t be accessed without approval.</p>
<p>&nbsp;</p>
<h3><strong>Personalised AI, Protected at the Core</strong></h3>
<p>&nbsp;</p>
<p>Knox Vault not only provides protection for today’s threats, it also ensures your privacy as mobile experiences continue to evolve.</p>
<p>&nbsp;</p>
<p>As Galaxy AI becomes more useful, it also becomes more personal — learning how you use your device and adapting to your needs. And because this relies on deeply personal data, Knox Vault plays a crucial role in keeping that information private.</p>
<p>&nbsp;</p>
<p>Features like Now Brief<a href="#_ftn3" name="_ftnref3"><span>[3]</span></a> provide useful summaries and suggestions based on your daily activity, while Modes and Routines<a href="#_ftn4" name="_ftnref4"><span>[4]</span></a> creates auto-generated routines by adjusting settings in response to your habits. These tools and the highly tailored AI experiences they enable are guided by a map of personalised data – data that is encrypted, with Knox Vault securing the keys.</p>
<p>&nbsp;</p>
<p>Galaxy AI<sup>1</sup> also ensures privacy by processing tasks directly on-device where possible<a href="#_ftn5" name="_ftnref5"><span>[5]</span></a>, keeping data in your hands and off online servers. Audio Eraser,<a href="#_ftn6" name="_ftnref6"><span>[6]</span></a> for example, can remove the background noise from videos or voice recordings without the need for any cloud-based processing — helping your personal comversations stay private. Call Transcript<a href="#_ftn7" name="_ftnref7"><span>[7]</span></a> and summary operates in the same way, keeping your calls organised while ensuring personal conversations stay private by remaining on-device.<span style="text-decoration: line-through;"></span></p>
<p>&nbsp;</p>
<p>Knox Vault helps ensure your data is protected, confidential and secure. Building on its role in Galaxy AI<sup>1</sup> as the trusted foundation for security and privacy, Knox Vault will expand across Samsung’s growing AI ecosystem as AI becomes more deeply integrated into the user experience.</p>
<p>&nbsp;</p>
<p>Knox Vault is more than a security feature, it’s Samsung’s promise that no matter how advanced your devices become, or how much AI evolves, keeping privacy secured is our goal.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a><span> Fees may apply to certain AI Features at the end of 2025. Certain Galaxy AI features requires Samsung and Google Account. Internet connection may be required to use some features.</span></p>
<p><a href="#_ftnref2" name="_ftn2"><span>[2]</span></a><span> Samsung Knox Vault is included on Galaxy S series, Galaxy A series, Galaxy Tab S series and more. Knox Vault availability may vary by model.</span></p>
<p><a href="#_ftnref3" name="_ftn3"><span>[3]</span></a><span>  Now Brief requires Samsung Account login, app compatibility and user</span>’<span>s consent to access certain information. Service availability may vary.</span></p>
<p><a href="#_ftnref4" name="_ftn4"><span>[4]</span></a> Modes and Routines requires Samsung Account login. Customised content and recommendations requires Permissions to access data including location, app usage and how you use your device.</p>
<p><a href="#_ftnref5" name="_ftn5"><span>[5]</span></a><span> Samsung Account login required. Processing data only on your device allows advanced intelligence features to operate locally, rather than online. Enabling this option may limit the functionality of certain AI features that rely on online data processing for advanced capabilities.</span></p>
<p><a href="#_ftnref6" name="_ftn6"><span>[6]</span></a> Results may vary per video depending on sounds present in the video. Samsung Account login required. Certain types of sound can be detected such as voices, music, wind, nature, crowd and noise. The actual sound detection may vary depending on audio source, and the condition of the video. Accuracy of results is not guaranteed.</p>
<p><a href="#_ftnref7" name="_ftn7"><span>[7]</span></a> Call Transcript feature requires a network connection to receive calls. Samsung Account login required. Summary feature for Call Transcript is capable of automatically transcribing recorded calls when a certain number of characters is met and is under the character limit. Call recording may not be supported in some countries. Currently available on pre-installed Samsung phones and Voice Record app. Service availability may vary by language or region. Certain languages may require language pack download. Accuracy of results is not guaranteed.</p>
]]></content:encoded>
																				</item>
			</channel>
</rss>
