<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet title="XSL_formatting" type="text/xsl" href="https://news.samsung.com/my/wp-content/plugins/btr_rss/btr_rss.xsl"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
	<channel>
		<title>Mobile Security &#8211; Samsung Newsroom Malaysia</title>
		<atom:link href="https://news.samsung.com/my/tag/mobile-security/feed" rel="self" type="application/rss+xml" />
		<link>https://news.samsung.com/my</link>
        <image>
            <url>https://img.global.news.samsung.com/image/newlogo/logo_samsung-newsroom_my.png</url>
            <title>Mobile Security &#8211; Samsung Newsroom Malaysia</title>
            <link>https://news.samsung.com/my</link>
        </image>
        <currentYear>2026</currentYear>
        <cssFile>https://news.samsung.com/my/wp-content/plugins/btr_rss/btr_rss_xsl.css</cssFile>
		<description>What's New on Samsung Newsroom</description>
		<lastBuildDate>Thu, 09 Apr 2026 09:09:00 +0000</lastBuildDate>
		<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
					<item>
				<title>Leading the Way in Enterprise Mobile Security: Samsung’s Zero Trust Strategy</title>
				<link>https://news.samsung.com/my/leading-the-way-in-enterprise-mobile-security-samsungs-zero-trust-strategy?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Tue, 27 Jan 2026 21:00:10 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Knox Asset Intelligence]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Samsung Knox]]></category>
		<category><![CDATA[Zero Trust]]></category>
                <guid isPermaLink="false">https://bit.ly/4bgkdwR</guid>
									<description><![CDATA[  Today’s world is one of unprecedented innovation and rapidly evolving technology. It’s an era of endless possibilities, coupled with a new set of risks]]></description>
																<content:encoded><![CDATA[<p><img class="alignnone size-full wp-image-33735" src="https://img.global.news.samsung.com/my/wp-content/uploads/2026/01/001-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-e1769517657359.jpg" alt="" width="1000" height="667" /></p>
<p>&nbsp;</p>
<p>Today’s world is one of unprecedented innovation and rapidly evolving technology. It’s an era of endless possibilities, coupled with a new set of risks for security and privacy. At Samsung Electronics, we recognize that as we enter these uncharted territories, we must be prepared for potential threats that may arise. That’s why we stay deeply attuned to the ever-changing security landscape and champion a dynamic approach to enterprise security.</p>
<p>&nbsp;</p>
<p>The cybersecurity threats of today affect everyone, from consumers to businesses. Enterprise device fleets must be resilient against attacks of all kinds — from suspicious URLs, insider employee threats and malware, to emerging risks associated with AI usage in the workplace, including prompt injection and sensitive data leaks. As a growing number of employees across industries — from corporate offices to the frontlines — use devices to access enterprise networks and resources, these threats not only present significant security risks but may also lead to a substantial financial toll on businesses.</p>
<p>&nbsp;</p>
<p><img class="alignnone size-full wp-image-33736" src="https://img.global.news.samsung.com/my/wp-content/uploads/2026/01/002-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-e1769517759638.jpg" alt="" width="1000" height="667" /></p>
<p>&nbsp;</p>
<p>Enterprise security incidents can arise across operations. However, the <span><a href="https://www.idc.com/">International Data Corporation</a></span> (IDC)<a href="#_ftn1" name="_ftnref1"><span>[1]</span></a> found that an overwhelming 70 percent of successful breaches originate from endpoints — the devices that connect to networks like phones, laptops and tablets. Unfortunately, in today’s security operations landscape, IT administrators have much less visibility into mobile devices compared to PCs and servers. With mobile devices now being the most common method of employee network access, this has to change. A systematic, comprehensive approach is critical to ensuring seamless mobile capabilities and uncompromising protection. At Samsung, we’re setting a new standard for mobile enterprise security by committing to a collaborative Zero Trust strategy for endpoints in partnership with market leaders.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;">Core Principles for Zero Trust Endpoint Security</span></h3>
<p>Samsung’s legacy of innovation is built upon our deep understanding of users. We’re constantly listening to feedback from consumers and businesses, anticipating the evolution of mobile technology. This is what enables us to pioneer industry-first solutions for consumers and businesses alike. As the Head of the Global Mobile B2B Team, I’m especially proud of how we’ve led the way in critical areas that deliver value to enterprises across the board. From advancing hardware-backed device attestation and threat detection to fully embracing the security principles of Zero Trust, we are constantly striving to provide our customers with mobile devices and solutions that exceed their security requirements.</p>
<p>&nbsp;</p>
<p>Zero Trust is a security framework that replaces implicit trust with explicit trust by continuously assessing security posture, risk and trust levels based on context. The current security solutions market is dominated by network-centric Zero Trust solutions that focus on securing access at the network edge. Unfortunately, this approach by itself neglects a critical blind spot: the endpoint. Endpoints have the largest attack surface and are the most challenging IT assets to protect against cyberattacks. In most cases, they are the most vulnerable points in an organization’s IT ecosystem.</p>
<p>&nbsp;</p>
<p>Zero Trust principles for endpoints, when realized correctly, ensure that access requests from endpoints are handled based on context that correlates with the device’s security posture and the user’s needs, and are continuously verified in real time. Although there is no definitive list of core principles behind Zero Trust endpoint protection, the following principles are the most commonly adopted:</p>
<p>&nbsp;</p>
<ul>
<li>“Never trust, always verify” approach for devices: Devices should no longer be implicitly trusted just because they are within the network boundary. Instead, each device needs to prove its trustworthiness before being granted access.</li>
<li>Continuous risk assessment and enforcement: Endpoint protection must be agile and ready to adapt to constantly changing risk conditions. This means continuously evaluating context — such as location, time of access and the device’s security posture — and dynamically adjusting security policies accordingly. Suspicious activity needs to be addressed through enforcement actions such as access restrictions or complete isolation.</li>
<li>Restricted privileges and narrowly scoped access: Endpoints must enforce access control in real time based on context while ensuring privileges are granted dynamically with a narrow scope.</li>
<li>Incorporation of user identity, device posture and behavioral signals: A Zero Trust-compliant solution needs to make granular and informed trust decisions to enforce tight access controls. To enable such decisions, Zero Trust’s continuous evaluation of context integrates user identity, device posture and behavioral signals.</li>
</ul>
<p>&nbsp;</p>
<p>While the Zero Trust security strategy is growing in adoption, Samsung is fully embracing it. By doing so, we are helping to protect the most vulnerable points in an organization’s IT landscape. Risks related to endpoint security are constantly increasing as cloud-based applications, Bring Your Own Device (BYOD) programs and remote work prevail in the modern workplace environment. Samsung recognizes the critical nature of this problem and is proactively addressing it in collaboration with partners.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;">Innovation and Collaboration for Security at Every Level</span></h3>
<p><img class="alignnone size-full wp-image-33737" src="https://img.global.news.samsung.com/my/wp-content/uploads/2026/01/003-Editorial-Leading-the-Way-in-Enterprise-Mobile-Security-Samsungs-Zero-Trust-Strategy-Newsbody-e1769517836394.jpg" alt="" width="1000" height="667" /></p>
<p>&nbsp;</p>
<p>How does this work in practice? From the hardware level and all the way to the operating system and secure interface, Zero Trust security principles are built into the architecture of Samsung Galaxy devices, enhancing protection at every layer while intuitively integrating with a business’s existing security infrastructure. Together, these practices empower enterprises to administer proper threat detection and response securely and reliably.</p>
<p>&nbsp;</p>
<p>At Samsung, we recognize that <span><a href="https://www.samsungmobilepress.com/feature-stories/editorial-there-is-no-privacy-without-stronger-security-thats-why-were-joining-forces-with-the-security-community-to-keep-you-safe" target="_blank" rel="noopener">security is a collective effort</a></span>. It is only through open collaboration with partners that we can bring the most advanced solutions to our customers. In my time at Samsung, we’ve made extensive strides in bringing forth versatile, optimized and secure solutions<a href="#_ftn2" name="_ftnref2"><span>[2]</span></a> for enterprises of all kinds.</p>
<p>&nbsp;</p>
<p>In 2024, we integrated Samsung Knox — our defense-grade, multilayer security management platform — with Cisco Secure Access, an innovative Security Service Edge solution. <a href="https://www.samsungknox.com/en/blog/samsung-cisco-collaboration" target="_blank" rel="noopener">This collaboration</a> delivers a secure and flexible employee access experience, enabling organizations to verify user identity, device posture and context before granting access.</p>
<p>&nbsp;</p>
<p>We also have a strong partnership with Microsoft, defined by a shared vision of reimagining mobile device security for business customers. The <span><a href="https://www.samsungmobilepress.com/press-releases/samsung-and-microsoft-unveil-first-on-device-attestation-solution-for-enterprise">first step</a></span> of this strategic plan began in 2023, when we integrated Samsung Knox with Microsoft Intune, creating the industry’s first on-device mobile hardware-backed device attestation solution that works equally well on both company and personal devices. This solution <span><a href="https://www.samsungknox.com/en/blog/samsung-knox-on-device-attestation-now-default-in-microsoft-intune">is now enabled by default in all new Android App Protection Policies</a></span>, empowering organizations to bolster the security posture of all Samsung devices in their fleet. In yet another step forward in our partnership with Microsoft, Samsung has become the industry’s first mobile manufacturer to offer a direct-to-security operations center (SOC) connector. This was achieved through the <span><a href="https://www.samsungknox.com/en/blog/knox-asset-intelligence-for-microsoft-sentinel" target="_blank" rel="noopener">integration of Knox Asset Intelligence<u></u></a><u><a href="#_ftn3" name="_ftnref3"><span>[3]</span></a></u> and Microsoft Sentinel</span>, a scalable, cloud-native security information and event management (SIEM) solution. This integration delivers unprecedented visibility into mobile security threats, providing centralized monitoring and protection across enterprise device fleets.</p>
<p>&nbsp;</p>
<p>Working together with partners, Samsung is addressing key challenges in multiple areas — securing mobile devices, minimizing damage from potential attacks and empowering employees to work efficiently and effectively without security concerns getting in their way.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;">Holistic Security for Enhanced Privacy</span></h3>
<p>We’re constantly innovating, refining and developing <a href="https://www.samsungmobilepress.com/articles/samsung-knox-native-solution-sets-a-new-standard-in-secure-communications-for-governments-and-enterprises" target="_blank" rel="noopener">Samsung Knox solutions</a> in order to bring our customers enhanced control, greater transparency and better protection against cyber threats.</p>
<p>&nbsp;</p>
<p><a href="https://www.samsungknox.com/en/blog/enabling-uncompromising-security-for-every-zero-trust-journey" target="_blank" rel="noopener">By embodying Zero Trust as a core pillar of Samsung Knox</a>, every measure is being taken to help secure mobile devices and data. At the same time, Samsung is breaking new ground with first-to-market solutions by constantly keeping a pulse on the ever-changing threat landscape.</p>
<p>&nbsp;</p>
<p>As threats become increasingly complex with AI and hyperconnectivity taking center stage, security and privacy are more important now than ever before. Today’s business landscape is constantly being threatened by an increasing volume of cyberattacks that aim to exploit IT vulnerabilities, with mobile devices and other endpoints quickly becoming prime targets.</p>
<p>&nbsp;</p>
<p>That’s why Samsung is working with market-leading companies to provide security solutions that work seamlessly with existing infrastructure, offering true end-to-end protection. These collaborative solutions are a testament to our commitment to not only adhere to industry standards but to also drive their continued development when it comes to Zero Trust endpoint security. This is just the beginning.</p>
<p>&nbsp;</p>
<p>To learn more about Samsung Knox’s approach to mobile security, visit <a href="http://samsungknox.com" target="_blank" rel="noopener">samsungknox.com</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6><em><a href="#_ftnref1" name="_ftn1">[1]</a> The Hacker News, “<a href="https://thehackernews.com/2024/04/10-critical-endpoint-security-tips-you.html" target="_blank" rel="noopener">10 Critical Endpoint Security Tips You Should Know</a>,” April 26, 2024 (reporting IDC data)</em></h6>
<h6><em><a href="#_ftnref2" name="_ftn2">[2]</a> Cisco Secure Access, Microsoft Intune and Microsoft Sentinel are third-party solutions and paid offerings.</em></h6>
<h6><em><a href="#_ftnref3" name="_ftn3">[3]</a> Knox Asset Intelligence is a paid offering available through Knox Suite Plans.</em></h6>
]]></content:encoded>
																				</item>
					<item>
				<title>Samsung Knox Native Solution Sets a New Standard in Secure Communications for Governments and Enterprises</title>
				<link>https://news.samsung.com/my/samsung-knox-native-solution-sets-a-new-standard-in-secure-communications-for-governments-and-enterprises?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Tue, 17 Dec 2024 09:55:51 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[BSI]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Samsung Knox]]></category>
		<category><![CDATA[Samsung Knox Native Solution]]></category>
		<category><![CDATA[Secure Element (eSE)]]></category>
		<category><![CDATA[security]]></category>
                <guid isPermaLink="false">https://bit.ly/4iGofQs</guid>
									<description><![CDATA[  Samsung Electronics Co., Ltd. today announced that Samsung Knox Native Solution, a platform that enables fast and easily accessible secure]]></description>
																<content:encoded><![CDATA[<p><img class="alignnone wp-image-29620 size-full" src="https://img.global.news.samsung.com/my/wp-content/uploads/2024/12/Samsung-Mobile-Knox-Native-Solution-BSI-certification-security_dl1-e1734399077756.jpg" alt="" width="1000" height="667" /></p>
<p>&nbsp;</p>
<p>Samsung Electronics Co., Ltd. today announced that Samsung Knox Native Solution, a platform that enables fast and easily accessible secure communications tailored for governmental authorities and enterprises, has received certification from the Bundesamt für Sicherheit in der Informationstechnik (BSI), also known as the German Federal Office for Information Security. Developed in close collaboration with the BSI, the Knox Native Solution creates a dedicated, secure environment on mobile devices, delivering fortified security to meet extremely rigorous requirements. With certifications from numerous government bodies worldwide — including Australia, Canada, the Netherlands, the United Kingdom and the United States — Samsung continues to establish itself as a global leader in cybersecurity solutions.</p>
<p>&nbsp;</p>
<p>Achieving official recognition for government use from a leading European security authority marks a significant milestone for the Knox Native Solution and reinforces Samsung’s trusted role in delivering secure, integrated solutions that meet the high standards for government and enterprise use. This certification also reinforces Knox Native Solution as a globally relevant model for organizations, including in key industries like energy infrastructure or public transportation, or those seeking robust, reliable and ready-to-deploy security for optimized mobile communications.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;"><strong>Security Developed in Collaboration With the BSI</strong></span></h3>
<p>Previously, achieving government-grade secure mobile communication on Android-based devices often required the use of external SD cards, additional software and multiple PINs, resulting in a cumbersome manual process with high costs and prolonged approval cycles for security solutions. Any updates to third-party security solutions would require the entire device to undergo re-certification, adding further complexity to the process. To address these challenges, Samsung collaborated with the BSI, which is recognized as the leading authority for security policies and certifications across Europe and key global industries. Together, they developed a pre-configured, government-grade setup that aligns with Germany’s rigorous security standards and sets the standard for secure devices and solutions worldwide.</p>
<p>&nbsp;</p>
<p>This innovative platform incorporates advanced features, including the embedded Secure Element (eSE),<a href="#_ftn1" name="_ftnref1"><span>[1]</span></a> which integrates the BSI Java Card Applet and is certified at the industry-leading Common Criteria Evaluation Assurance Level (CC EAL) 6+. With eSE, Knox Native Solution establishes a dedicated security zone within the device, helping to ensure data integrity, real-time threat protection and encrypted storage for sensitive communication channels. This platform doesn’t require third-party applications or add-ons, enabling a tamper-resistant security environment for core functions like email, calendar and contacts — all built directly into the device.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;"><strong>Seamless and Secure Mobile Experiences</strong></span></h3>
<p>Knox Native Solution continues to cement the new industry standard for mobile security, making Samsung Galaxy devices successfully meet the strict security standards of the BSI utilizing eSE. Knox Native Solution enables organizations to deploy secure devices with minimal steps, eliminating the need for complex setups while ensuring high security standards. Using Samsung Knox’s built-in protections for data-at-rest, data-in-use and data-in-transit, this solution preserves a streamlined user experience without compromising security. A single PIN activation covers a wide range of work scenarios, and company-owned apps integrate seamlessly through the Knox Native Solution SDK, making advanced security feel effortless for users and administrators alike.</p>
<p>&nbsp;</p>
<p>Knox Native Solution reimagines security evaluation processes on Samsung Galaxy devices for government and enterprise in Germany, requiring only newly updated apps to be reviewed and approved — empowering users with cost-efficient and optimized mobile solutions. By simplifying development and evaluation with pre-approved security features, Knox Native Solution enables even large device fleets with high security standards to be managed efficiently through Knox Suite, providing enterprises with centralized control over their security needs. As an established and trusted provider of secure mobile solutions to German government entities, Samsung remains committed to delivering robust and seamless mobile security for organizations worldwide.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;"><strong>Continued Trust in a Hyper-Connected World</strong></span></h3>
<p>This BSI certification stands as a testament to Samsung’s ability to meet top-tier government standards, exemplifying how enterprises and governments around the world can adopt secure, integrated mobile solutions. Building on this success in Germany, Samsung plans to expand the availability of Knox Native Solution to other regions, reinforcing its role as a global leader in secure, hyperconnected mobile ecosystems.</p>
<p>&nbsp;</p>
<p>“We are honored to receive this certification from the BSI as proof of our commitment to meeting rigorous security standards and providing fortified mobile security solutions to a growing list of governments and enterprises worldwide,” said Tuncay Sandikci, Director of MX B2B at Samsung Electronics Germany. “In an increasingly hyperconnected world, we remain dedicated to empowering all users with secure, privacy-driven experiences that put transparency and user choice at the forefront.”</p>
<p>&nbsp;</p>
<p>For more information about Samsung Knox, please visit <span><a href="https://www.samsungknox.com/en" target="_blank" rel="noopener">samsungknox.com</a></span>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6><em><a href="#_ftnref1" name="_ftn1">[1]</a> Galaxy S23 (all models), Galaxy S24 (all models), Galaxy Tab S8+ (German only) and Galaxy XCover6 Pro include the embedded Secure Element (eSE). Samsung plans to use eSE embedded devices for approved Knox Matrix security features and to continue to expand to additional models in the future.</em></h6>
]]></content:encoded>
																				</item>
					<item>
				<title>Samsung Electronics Scales Up Mobile Security Rewards Program To Boost Industry Collaboration and Safety</title>
				<link>https://news.samsung.com/my/samsung-electronics-scales-up-mobile-security-rewards-program-to-boost-industry-collaboration-and-safety?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Mon, 16 Dec 2024 10:00:38 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Annual Rewards Program Report]]></category>
		<category><![CDATA[Important Scenario Vulnerability Program]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Samsung Mobile Security Reward Program]]></category>
		<category><![CDATA[Samsung Mobile Security Risk Classification]]></category>
		<category><![CDATA[security]]></category>
                <guid isPermaLink="false">https://bit.ly/3ZBP13C</guid>
									<description><![CDATA[  Samsung Electronics Co., Ltd announced the enhancement of its Mobile Security Rewards Program, increasing the maximum reward amount to $1 million for]]></description>
																<content:encoded><![CDATA[<p><img class="alignnone wp-image-29607 size-full" src="https://img.global.news.samsung.com/my/wp-content/uploads/2024/12/Samsung-Mobile-Security-e1734313408790.jpg" alt="" width="1000" height="667" /></p>
<p>&nbsp;</p>
<p>Samsung Electronics Co., Ltd announced the enhancement of its Mobile Security Rewards Program, <strong>increasing the maximum reward amount to $1 million</strong> for eligible security vulnerability reports received from the external security community. This is part of Samsung’s ongoing efforts to foster transparency and increased collaboration in mobile security, with the criteria of the program laid out in the <span><a href="https://security.samsungmobile.com/securityReportingRiskClassification.smsb" target="_blank" rel="noopener">Samsung Mobile Security Risk Classification </a></span>which now includes additional classification factors.</p>
<p>&nbsp;</p>
<p>Alongside this, Samsung has also published its first security-focused Annual Rewards Program Report, showcasing the most significant highlights since the project’s launch and emphasizing the crucial role of the program’s participants. The Mobile Security Rewards Program complements Samsung’s current offering of <strong>up to seven years of </strong><span><a href="https://security.samsungmobile.com/workScope.smsb" target="_blank" rel="noopener"><strong>security updates</strong></a></span><a href="#_ftn1" name="_ftnref1"><span>[1]</span></a>, highlighting the company’s commitment to user device safety.</p>
<p>&nbsp;</p>
<p>“With cybersecurity attacks becoming increasingly intelligent and more challenging to identify, we actively encourage participation from the security community in finding these threats,” said Justin Choi, Corporate VP &amp; Head of Security Team, Mobile eXperience Business at Samsung Electronics. “Their support helps us to ensure our products are continuously monitored for potential vulnerabilities, enabling us to constantly enhance the protection of our customers. It is critically important that this protection is provided and that user data and information are safeguarded, which is why we prioritize security throughout all our products and services.”</p>
<p>&nbsp;</p>
<p>Originally launched in 2017, the program embodies Samsung’s commitment to openness and a collective approach to enhancing mobile security. By collaborating with a wide range of global experts — including cybersecurity researchers, ethical hackers and independent security professionals — the program follows a strategic, systematic and proactive strategy to identify and address vulnerabilities, reinforcing the security of users’ mobile experiences.</p>
<p>&nbsp;</p>
<p>The maximum reward of $1 million is part of the <strong>newly introduced </strong><span><a href="https://security.samsungmobile.com/securityPostDetail.smsb/189" target="_blank" rel="noopener"><strong>Important Scenario Vulnerability Program</strong></a></span>. This initiative focuses on the most severe attack scenarios and vulnerabilities, including arbitrary code execution on highly privileged targets; device unlock and full user data extraction; arbitrary application installations; and bypass of device protection solutions. Partnering with the security community not only reinforces Samsung&#8217;s dedication toward a transparent, collaborative framework that continuously adapts to emerging risks, but also speeds up the <span><a href="https://samsungmobilepress.com/feature-stories/samsung-project-infinity-the-team-keeping-you-safe-online" target="_blank" rel="noopener">detection and resolution</a></span> of these potential critical threats.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;"><strong>Increased Transparency of Rewards Program Criteria</strong></span></h3>
<p><span><a href="https://security.samsungmobile.com/securityReportingRiskClassification.smsb" target="_blank" rel="noopener">Samsung Mobile Security Risk Classification</a></span> now offers a more detailed and publicly accessible system for categorizing vulnerabilities, incorporating new considerations such as downgrade factors, which allow a threat’s severity level to be lowered, and an ineligible classification, for threats determined to pose minimal security concerns. The system assigns severity levels based on security risk and impact across five categories: Critical, High, Moderate, Low, and Ineligible or Less-Than-Low Security Impact. This comprehensive approach provides clear guidance for both participants and the broader security community, offering a more structured framework for vulnerability reporting. Additionally, it outlines the <span><a href="https://security.samsungmobile.com/rewardsProgram.smsb" target="_blank" rel="noopener">conditions affecting the reward qualification and amount</a></span>.</p>
<p>&nbsp;</p>
<p>The program covers all of Samsung’s mobile devices currently receiving monthly, quarterly and biannual security updates. In addition, the program will reward eligible submissions for potential vulnerabilities in the latest Samsung Galaxy services, including Bixby, Samsung Account and Samsung Wallet, among others.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;">Samsung Releases Inaugural Program Report</span></h3>
<p>In August 2024, Samsung published its first security-focused <span><a href="https://security.samsungmobile.com/securityPostDetail.smsb/190" target="_blank" rel="noopener">Annual Rewards Program Report</a></span>, summarizing the most significant highlights since the project’s launch in 2017. Highlights include the awarding of over $800,000 to 113 researchers in 2023 alone and a total of more than $4 million in rewards paid out by Samsung to security experts around the world to date, underscoring the crucial role of the program’s participants.</p>
<p>&nbsp;</p>
<p>The Mobile Security Rewards Program is effective immediately. For additional information, including terms and conditions, please visit the <span><a href="https://security.samsungmobile.com/main.smsb" target="_blank" rel="noopener">Samsung Mobile Security</a></span> page.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6><em><a href="#_ftnref1" name="_ftn1">[1]</a> Timing and availability of security maintenance releases for Samsung Galaxy devices may vary by market, network provider and/or model.</em></h6>
]]></content:encoded>
																				</item>
					<item>
				<title>How Samsung Protects Your Smartphones from Cyberattacks</title>
				<link>https://news.samsung.com/my/how-samsung-protects-your-smartphones-from-cyberattacks?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Tue, 23 Nov 2021 10:24:17 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Galaxy Security]]></category>
		<category><![CDATA[Knox]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Personal data protection]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Samsung Knox]]></category>
                <guid isPermaLink="false">https://bit.ly/30J70dF</guid>
									<description><![CDATA[﻿   The smartphone has become the centre of how we work, live and play. For many, it has even become the only thing that we bring out of the home,]]></description>
																<content:encoded><![CDATA[<div class="youtube_wrap"><iframe src="https://www.youtube.com/embed/4ybzhv9rnAQ" width="300" height="150" frameborder="0" allowfullscreen="allowfullscreen"><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span><span style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" data-mce-type="bookmark" class="mce_SELRES_start"></span></iframe></div>
<p>&nbsp;</p>
<p>The smartphone has become the centre of how we work, live and play. For many, it has even become the only thing that we bring out of the home, replacing our laptops, wallets and even house keys.</p>
<p>&nbsp;</p>
<p>While we are generally more mindful today of the dangers posed by hackers to our laptops and computers, we also need to recognise that smartphones are prone to cyberattacks as well. Hackers go where the crowds are and right now, that’s mobile devices. That’s why it’s never been more important to stay safe, and why we’re constantly innovating to protect you and your data against emerging threats.</p>
<p>&nbsp;</p>
<p>The billions of smartphones around the world are filled with sensitive personal and business data, providing infinite opportunities for hackers to steal and sell private information. In fact, cybersecurity firm IronNet <span><a href="https://www.ironnet.com/blog/apacs-vulnerability-to-cyber-attacks">reported</a></span> that cyberattacks have increased 168% between May 2020 and May 2021, with attacks on smartphones becoming one of the biggest cybersecurity threats in the Asia Pacific region.</p>
<p>&nbsp;</p>
<p>Samsung is committed to keeping users safe and secure, with Samsung Knox providing true end-to-end protection throughout the entire lifecycle of your device. In this article, we explore five potential cyberattack scenarios that could happen when the safety of your device is compromised – and explain how Samsung Knox protects you from these threats, in line with our ethos of placing security at the heart of every decision we make.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;"><strong>Cyberattack Scenario 1: Unauthorized backdoor access</strong></span></h3>
<p>Outside of Samsung, developers routinely create software ‘backdoors’ for apps and even mobile OSes so that they can gain easy access for troubleshooting purposes. However, hackers are able to discover these backdoors, which usually bypass any or all cybersecurity measures on the device in question.</p>
<p>&nbsp;</p>
<p>To prevent unauthorised backdoor access, do not download unofficial or unauthorized apps. Downloading software other than what the manufacturer originally installed to gain full access to the device’s operating system could also introduce malware or spyware that leads to unauthorised backdoor access. <span style="text-decoration: line-through;"></span></p>
<p>&nbsp;</p>
<p><strong>How Samsung protects you against this threat:</strong> At Samsung, we design, create, and validate every computer chip, every piece of wiring, and every hardware component before using them to manufacture our smart devices in highly secure factories around the world. This chip-up approach gives us control over design, manufacturing and assembly, ensuring a secure supply chain that prevents unauthorised backdoor access in our devices – resulting in an end product that our users can trust completely.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;"><strong>Cyberattack Scenario 2: Compromised, weak, or re-used passwords</strong></span></h3>
<p>As users continue to create new accounts for digital services, ranging from telehealth services to new ride-hailing and e-commerce platforms, they provide more avenues for hackers to exploit.</p>
<p>&nbsp;</p>
<p>As an August 2021 survey from IBM<span>[1]</span> found, 86% of consumers in Asia Pacific admit that they re-use the same credentials across multiple online accounts. This is a poor data privacy habit – just one attack could leave a user’s entire internet footprint vulnerable to hackers.</p>
<p>&nbsp;</p>
<p><strong>How Samsung protects you against this threat:</strong> Samsung’s devices<span>[2]</span> are equipped with innovative biometric authentication technology, such as Ultrasonic Fingerprint, so that access to your data can be protected even if your device is lost or stolen. Known as Samsung Pass<span>[3]</span>, this biometric authentication tool also lets users easily access log-in credentials without the need to remember countless usernames and passwords<span>[4]</span>! To take data protection to the next level, we have also equipped our devices with Knox Vault, a secure processor that operates independently from the main CPU. Knox Vault securely isolates your biometrics data from the rest of your phone, so no one can get their hands on your data.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;"><strong>Cyberattack Scenario 3: Free Wi-Fi may not be so free after all</strong></span></h3>
<p>&nbsp;</p>
<p>Free Wi-Fi hotspots are a boon for everyone who needs access to the Internet on their mobile devices for work or play. However, public Wi-Fi services provide an opportunity for hackers to steal data, as the data that you send across the web – such as credit card information for online purchases – might first pass through the hands of a hacker via a public Wi-Fi network.</p>
<p>&nbsp;</p>
<p><strong>How Samsung protects you against this threat: </strong>For everyday browsing, <span><a href="https://youtu.be/xXmNmrlKQIk">Secure Wi-Fi</a></span><span>[5]</span> encrypts outgoing internet traffic and disables tracking apps and websites. It allows you to browse the internet safely on public wireless connections without fear of security breaches<span>[6]</span>.</p>
<p>&nbsp;</p>
<p><img class="alignnone size-full wp-image-14648" src="https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-2.png" alt="" width="1379" height="933" srcset="https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-2.png 1379w, https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-2-832x563.png 832w, https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-2-768x520.png 768w, https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-2-1024x693.png 1024w" sizes="(max-width: 1379px) 100vw, 1379px" /></p>
<p>&nbsp;</p>
<h3></h3>
<h3></h3>
<h3><span style="color: #000080;"><strong>Cyberattack Scenario 4: Phishing attacks compromising sensitive data  </strong></span></h3>
<p>&nbsp;</p>
<p>Phishing is a type of attack in which cyber criminals trick victims into handing over sensitive information or installing malware<span>[7]</span>, disguised as links, attachments, or even legitimate apps, on their devices.</p>
<p>Once hackers have access to your sensitive information, they could use it to demand a ransom from you, steal your personal information, carry out other vices, or make purchases with your credit card information, for instance.</p>
<p>&nbsp;</p>
<p><strong>How Samsung protects you </strong><strong>against this threat</strong><strong>:</strong> Device Protection in Samsung Device Care continuously scans your device for malware or suspicious activity, and alerts you when you mistakenly install malicious apps through detection via the McAfee protection. <span style="text-decoration: line-through;"></span></p>
<p>&nbsp;</p>
<p><img class="alignnone size-full wp-image-14645" src="https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-3.jpg" alt="" width="3840" height="1500" srcset="https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-3.jpg 3840w, https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-3-1000x391.jpg 1000w, https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-3-768x300.jpg 768w, https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-3-1024x400.jpg 1024w" sizes="(max-width: 3840px) 100vw, 3840px" /></p>
<p>&nbsp;</p>
<p>Additionally, the <span><a href="https://www.samsungknox.com/en/solutions/personal-apps/secure-folder">Samsung Secure Folder</a></span> keeps data secure, and isolates problematic apps within the folder to keep apps away from users’ personal information.</p>
<p>&nbsp;</p>
<p>Meanwhile, when you’re paying for purchases with <span><a href="https://www.samsung.com/global/galaxy/samsung-pay/">Samsung Pay</a></span><span>[8]</span> on your mobile device, your card information is encrypted and completely isolated to protect it at all times.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;"><strong>Cyberattack Scenario 5: Zero-day vulnerability </strong></span></h3>
<p><strong> </strong></p>
<p>As hackers and cyber attackers are constantly trying to hack into devices, they are always on the lookout for zero-day vulnerabilities. A zero-day vulnerability is a vulnerability in a system or device that has been discovered but is not yet patched. This can be particularly dangerous as cybercriminals target the flaws in a system before developers or the public are aware it even exists.</p>
<p>&nbsp;</p>
<p><img class="alignnone size-full wp-image-14646" src="https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-4.jpg" alt="" width="1430" height="805" srcset="https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-4.jpg 1430w, https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-4-728x410.jpg 728w, https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-4-1000x563.jpg 1000w, https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-4-768x432.jpg 768w, https://img.global.news.samsung.com/my/wp-content/uploads/2021/11/PR_How-Samsung-Protects-Your-Smartphones-from-Cyberattacks_-SEAO-Feature-Story_Image-4-1024x576.jpg 1024w" sizes="(max-width: 1430px) 100vw, 1430px" /></p>
<p>&nbsp;</p>
<p><strong>How Samsung protects you against this threat: </strong>Samsung Knox offers real time protection, always actively protecting your devices against data attacks or malware. This means that unauthorised attempts to access or modify your phone’s core are blocked in real time.</p>
<p>&nbsp;</p>
<p>When users reboot their Samsung smartphone, Secure Boot is activated to detect any unauthorized software and block attempts to compromise the device through multi-layered, defense-grade<span>[9]</span> security. If the smartphone is booted in an unapproved state, Samsung Knox will automatically lock up apps containing sensitive data such as Samsung Pay, Samsung Pass, Secure Folder or Samsung Health.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;"><strong>Looking ahead to a more secure future</strong></span></h3>
<p>The smartphone has become a key part of our digital lives, whether from home, at the classroom, or even in the office. With new cyber threat vectors continuously putting us at risk, we need to stay vigilant and play an active role in keeping ourselves and our loved ones safe in this digital world.</p>
<p>&nbsp;</p>
<p>Security does not just stop at smartphones for Samsung, as Knox protection also extends to the smart appliances in Samsung’s portfolio for an additional layer of protection. This means that your Samsung smart appliances are protected and secured, whether you are mirroring the video you are watching on your Galaxy device with the SmartView app<span>[10]</span> to the screen on your Family Hub<img src="https://s.w.org/images/core/emoji/11/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, or using the AI function on your AI EcoBubble washing machine to calibrate optimal wash settings.</p>
<p>&nbsp;</p>
<p>As a Samsung user, you can be assured that you have a digital partner committed to world-class security and privacy standards – keeping you safe while you work, study, and play.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6><span>[1]</span> IBM Security: IBM Consumer Survey: Security Side Effects of the Pandemic: <span><a href="https://filecache.mediaroom.com/mr5mr_ibmnews/191177/Pandemic%20Security%20Side%20Effects%20Global%20Survey_IBM%20Analysis.pdf">https://filecache.mediaroom.com/mr5mr_ibmnews/191177/Pandemic%20Security%20Side%20Effects%20Global%20Survey_IBM%20Analysis.pdf</a></span></h6>
<h6><span>[2]</span> Biometric authentication feature availability may vary by device</h6>
<h6><span>[3]</span> The available functions, features, and compatible applications for Samsung Pass may vary by country due to differing regulatory and legal environments.</h6>
<h6><span>[4] </span>As a best practice, consumers are still advised to input complex passwords to secure their login credentials.</h6>
<h6><span>[5]</span> Secure Wi-Fi feature availability may vary depending on country, carrier, or network environment and may not be supported on all Samsung mobile devices. Fees may apply depending on Secure Wi-Fi usage.</h6>
<h6><span>[6]</span> As a best practice, avoid connecting to unknown Wi-Fi hotspots and always keep the Wi-Fi network at home secured with complex and long passwords.</h6>
<h6><span>[7]</span> <span><a href="https://www.itgovernance.co.uk/phishing">https://www.itgovernance.co.uk/phishing</a></span></h6>
<h6><span>[8]</span> Availability of Samsung Pay may vary by device, bank, issuer, and country</h6>
<h6><span>[9]</span> Knox received more accreditations than any other mobile device manufacturer, including STIG approval from the US Defense Information Systems Agency for use in DoD networks in 2013 and certifications from the US Department of Defense, the UK’s NCSC and ANSSI in France</h6>
<h6><span>[10]</span> Compatible with all major apps on Samsung Galaxy S6 models or later, running Android 8.1 or higher.</h6>
]]></content:encoded>
																				</item>
					<item>
				<title>[Video] Samsung Brings Next-Level Security to Galaxy S21 Series With Samsung Knox Vault</title>
				<link>https://news.samsung.com/my/video-samsung-brings-next-level-security-to-galaxy-s21-series-with-samsung-knox-vault?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Mon, 21 Jun 2021 17:09:41 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Galaxy Security]]></category>
		<category><![CDATA[Knox vault processor]]></category>
		<category><![CDATA[Knox vault protocol]]></category>
		<category><![CDATA[Knox vault storage]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Personal data protection]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Samsung Knox Vault]]></category>
                <guid isPermaLink="false">https://bit.ly/3zK92qQ</guid>
									<description><![CDATA[In the new normal of digital connectivity, privacy and security have never been more important. Samsung Knox, the security platform that keeps your Galaxy]]></description>
																<content:encoded><![CDATA[<p>In the new normal of digital connectivity, privacy and security have never been more important. Samsung Knox, the security platform that keeps your Galaxy devices safe, has evolved to meet the growing demand for data protection. Currently available on the Galaxy S21 series,<span><sup>1</sup></span><span> </span>Samsung Knox Vault delivers next-level security for your personal data.</p>
<p>&nbsp;</p>
<p>Not only does it encrypt your personal data, but the Samsung Knox Vault processor keeps your important information secure, including sensitive information linked to services like Samsung Pay. Any data saved on Samsung Knox Vault storage is isolated from the main operating system for even further protection. Not only is your data secure, it is also protected against a variety of attacks including voltage, temperatures and laser attacks.</p>
<p>&nbsp;</p>
<p>Check out the video below to learn more about how Samsung Knox Vault protects your most important information.</p>
<p>&nbsp;</p>
<div class="youtube_wrap"><iframe src="https://www.youtube.com/embed/i5kwnvn5510?rel=0" width="300" height="150" frameborder="0" allowfullscreen="allowfullscreen"><span style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" data-mce-type="bookmark" class="mce_SELRES_start"></span></iframe></div>
<div></div>
<div></div>
<div></div>
<h6><em><span><sup>1</sup> While currently available only on the Galaxy S21 series, Samsung Knox Vault may come to other Galaxy devices in the future.</span></em></h6>
]]></content:encoded>
																				</item>
					<item>
				<title>Mobile Security Quiz: Is Your Smartphone Safe?</title>
				<link>https://news.samsung.com/my/mobile-security-quiz-is-your-smartphone-safe?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Wed, 12 Jun 2019 10:24:28 +0000</pubDate>
						<category><![CDATA[Infographics]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Android Pie OS]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[One UI]]></category>
		<category><![CDATA[Samsung Blockchain Keystore]]></category>
		<category><![CDATA[Samsung Galaxy]]></category>
		<category><![CDATA[Samsung Knox]]></category>
		<category><![CDATA[Samsung One UI]]></category>
		<category><![CDATA[Samsung Pass]]></category>
		<category><![CDATA[Samsung Pay]]></category>
		<category><![CDATA[Samsung's Find My Mobile]]></category>
		<category><![CDATA[Samsung's Intelligent Wi-Fi]]></category>
                <guid isPermaLink="false">http://bit.ly/2R67dii</guid>
									<description><![CDATA[Browsing the Internet and staying connected with our mobile devices has become almost second nature to many of us. As we store some of our most valuable and]]></description>
																<content:encoded><![CDATA[<p>Browsing the Internet and staying connected with our mobile devices has become almost second nature to many of us. As we store some of our most valuable and private information on our phones, it’s more important than ever before to keep our devices secure and protected.</p>
<p>&nbsp;</p>
<p>Luckily, you don’t need to be an expert to stay safe in our connected world. Check out the quiz below to see if you have the basics covered.</p>
<p>&nbsp;</p>
<p><img class="aligncenter size-full wp-image-7707" src="https://img.global.news.samsung.com/my/wp-content/uploads/2019/06/Mobile-Security-Quiz_Is-Your-Smartphone-Safe.jpg" alt="" width="1400" height="9070" srcset="https://img.global.news.samsung.com/my/wp-content/uploads/2019/06/Mobile-Security-Quiz_Is-Your-Smartphone-Safe.jpg 1400w, https://img.global.news.samsung.com/my/wp-content/uploads/2019/06/Mobile-Security-Quiz_Is-Your-Smartphone-Safe-63x408.jpg 63w, https://img.global.news.samsung.com/my/wp-content/uploads/2019/06/Mobile-Security-Quiz_Is-Your-Smartphone-Safe-768x4976.jpg 768w, https://img.global.news.samsung.com/my/wp-content/uploads/2019/06/Mobile-Security-Quiz_Is-Your-Smartphone-Safe-158x1024.jpg 158w" sizes="(max-width: 1400px) 100vw, 1400px" /></p>
]]></content:encoded>
																				</item>
			</channel>
</rss>
