<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet title="XSL_formatting" type="text/xsl" href="https://news.samsung.com/uk/wp-content/plugins/btr_rss/btr_rss.xsl"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
	<channel>
		<title>security &#8211; Samsung Newsroom U.K.</title>
		<atom:link href="https://news.samsung.com/uk/tag/security/feed" rel="self" type="application/rss+xml" />
		<link>https://news.samsung.com/uk</link>
        <image>
            <url>https://img.global.news.samsung.com/image/newlogo/logo_samsung-newsroom_uk.png</url>
            <title>security &#8211; Samsung Newsroom U.K.</title>
            <link>https://news.samsung.com/uk</link>
        </image>
        <currentYear>2026</currentYear>
        <cssFile>https://news.samsung.com/uk/wp-content/plugins/btr_rss/btr_rss_xsl.css</cssFile>
		<description>What's New on Samsung Newsroom</description>
		<lastBuildDate>Fri, 10 Apr 2026 12:29:35 +0000</lastBuildDate>
		<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
					<item>
				<title>Coming Soon: A New Layer of Privacy</title>
				<link>https://news.samsung.com/uk/coming-soon-a-new-layer-of-privacy?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Wed, 28 Jan 2026 08:52:38 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Galaxy AI]]></category>
		<category><![CDATA[Galaxy Unpacked]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Samsung Knox]]></category>
		<category><![CDATA[security]]></category>
                <guid isPermaLink="false">https://bit.ly/3ZyrCR0</guid>
									<description><![CDATA[Our phones are our most personal space, but we use them in the least private places. On the bus, in the elevator, and wherever we’re waiting in]]></description>
																<content:encoded><![CDATA[<p><span data-contrast="auto">Our phones are our most personal space, but we use them in the least private places. On the bus, in the elevator, and wherever we’re waiting in line, our digital laundry gets aired in plain view. And as phones become more tailored to our routines and preferences, concerns about privacy are only growing. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></p>
<p><span data-contrast="auto">That’s why Samsung will soon unveil a new layer of privacy to shield your phone from shoulder surfing wherever you go. You’ll have the space to check your messages or enter a password on public transit without thinking twice about who might be watching.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></p>
<p>&nbsp;</p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></p>
<h3>Flexible Protection Built Over Years</h3>
<p>&nbsp;</p>
<p><span data-contrast="auto">Not everyone needs the same level of privacy. This new layer gives you the </span><a href="https://www.samsungmobilepress.com/feature-stories/your-privacy-secured-how-galaxy-ai-empowers-you-to-take-control-of-your-data/"><span data-contrast="none">choice to decide what works best for you</span></a><span data-contrast="auto">. You can customise it to raise your guard with specific apps, or when entering access details for more private areas of your phone. With multiple settings for adjusting visibility, you can limit what others can see based on the level of privacy protection you need. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></p>
<p><span data-contrast="auto">You can also choose to protect specific parts of your experience, such as notification pop-ups. It’s a tailored approach that you can fine-tune or switch off entirely, rather than a blanket one. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></p>
<p><span data-contrast="auto">It took over five years of engineering, testing and refining to get here. We studied how people use their phones, what they consider private, and how security should feel in everyday life. The result is a fusion of hardware and software expertly calibrated to protect you without getting in your way. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></p>
<p>&nbsp;</p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></p>
<h3>A New Standard for Mobile Privacy</h3>
<p>&nbsp;</p>
<p><span data-contrast="auto">This is the latest in a series of Galaxy innovations designed to keep you safe. </span><b><i><span data-contrast="auto">There is no privacy without strong security.</span></i></b><span data-contrast="auto"> For more than a decade, </span><b><span data-contrast="auto">Samsung Knox</span></b><span data-contrast="auto"> has established layers of protection for Galaxy devices, from dedicated security hardware like </span><a href="https://news.samsung.com/uk/your-privacy-secured-how-galaxy-ai-protects-privacy-with-samsung-knox-vault"><span data-contrast="none">Knox Vault</span></a><span data-contrast="auto"> to ecosystem defenses such as </span><a href="https://news.samsung.com/uk/samsung-introduces-future-ready-mobile-security-for-personalised-ai-experiences"><span data-contrast="none">Knox Matrix</span></a><span data-contrast="auto">. This latest safeguard builds on that commitment to security, introducing privacy at a pixel level.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></p>
<p><span data-contrast="auto">This is privacy you can see and security you can feel – and it’s coming to Galaxy very soon. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:276}"> </span></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div id="gtx-trans" style="position: absolute; left: 207px; top: 256.667px;">
<div class="gtx-trans-icon"></div>
</div>
<p><video style="display: block; margin: 0 auto; max-width: 500px; width: 100%; height: auto;" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2026/01/Samsung-Mobile-Galaxy-Unpacked-Samsung-Knox-A-New-Layer-of-Privacy_main1F.mp4" controls="controls" width="300" height="150"></video></p>
<p>&nbsp;</p>
<p><video style="display: block; margin: 0 auto; max-width: 500px; width: 100%; height: auto;" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2026/01/Samsung-Mobile-Galaxy-Unpacked-Samsung-Knox-A-New-Layer-of-Privacy_main2.mp4" controls="controls" width="300" height="150"></video></p>
<p>&nbsp;</p>
<p><video style="display: block; margin: 0 auto; max-width: 500px; width: 100%; height: auto;" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2026/01/Samsung-Mobile-Galaxy-Unpacked-Samsung-Knox-A-New-Layer-of-Privacy_main3.mp4" controls="controls" width="300" height="150"></video></p>
<p>&nbsp;</p>
]]></content:encoded>
													<enclosure url="https://img.global.news.samsung.com/uk/wp-content/uploads/2026/01/Samsung-Mobile-Galaxy-Unpacked-Samsung-Knox-A-New-Layer-of-Privacy_main1F.mp4" length="768494" type="video/mp4" />
<enclosure url="https://img.global.news.samsung.com/uk/wp-content/uploads/2026/01/Samsung-Mobile-Galaxy-Unpacked-Samsung-Knox-A-New-Layer-of-Privacy_main2.mp4" length="743168" type="video/mp4" />
<enclosure url="https://img.global.news.samsung.com/uk/wp-content/uploads/2026/01/Samsung-Mobile-Galaxy-Unpacked-Samsung-Knox-A-New-Layer-of-Privacy_main3.mp4" length="826870" type="video/mp4" />
							</item>
					<item>
				<title>Make Your Smart Home More Secure: Samsung Appliances’ Built-In Security</title>
				<link>https://news.samsung.com/uk/make-your-smart-home-more-secure-samsung-appliances-built-in-security?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Thu, 13 Nov 2025 12:40:08 +0000</pubDate>
						<category><![CDATA[Home Appliances]]></category>
		<category><![CDATA[Appliances]]></category>
		<category><![CDATA[Digital Appliances]]></category>
		<category><![CDATA[Knox Security]]></category>
		<category><![CDATA[Samsung Solves]]></category>
		<category><![CDATA[security]]></category>
                <guid isPermaLink="false">https://bit.ly/4pbEcAt</guid>
									<description><![CDATA[AI functionality has become deeply integrated into everyday life. Awareness and concern around the cybersecurity threats this poses are naturally increasing as]]></description>
																<content:encoded><![CDATA[<p>AI functionality has become deeply integrated into everyday life. Awareness and concern around the cybersecurity threats this poses are naturally increasing as the technology advances, with <span><a href="https://news.samsung.com/uk/privacy-blind-spot-could-stall-ais-future-in-uk-homes-says-new-study">recent research</a></span><a href="#_ftn1" name="_ftnref1"><span><u>[1]</u></span></a> showing that nearly 9 out of 10 Brits (89%) express concerns about their privacy. As a result, security must be at the forefront of technological innovation. Robust security frameworks within devices and appliances are more important than ever.</p>
<p>&nbsp;</p>
<p>For this reason, Samsung has been working to redefine how digital safety is built into everyday life. <span><a href="https://news.samsung.com/uk/samsung-unveils-ai-home-future-living-now-vision-at-ifa-2025">At IFA 2025</a></span>, we shared how it is making the <em>AI Home</em> a reality, with security a fundamental pillar. The company’s unique security solutions, including <span><a href="https://news.samsung.com/global/samsungs-ai-powered-home-appliances-are-becoming-more-secure-with-knox-matrix">Knox Matrix</a></span><a href="#_ftn2" name="_ftnref2"><span>[2]</span></a> and <span><a href="https://news.samsung.com/uk/your-privacy-secured-how-galaxy-ai-protects-privacy-with-samsung-knox-vault">Knox Vault</a></span><a href="#_ftn3" name="_ftnref3"><span>[3]</span></a> have been applied to a wide range of home appliances, helping create a safer and more secure home environment.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><strong>How Does Samsung Prioritise Security?</strong></h3>
<p>&nbsp;</p>
<p>While 2024 marked the first time Samsung formally introduced <span><a href="https://www.samsung.com/uk/sustainability/security-and-privacy/security/">Samsung Knox</a></span> for home appliances, the company has been working on embedded security for over a decade. Back in 2011, as Samsung was exploring appliances that could serve as early-stage home controllers, internal research had already begun to find ways to prevent data theft.</p>
<p>&nbsp;</p>
<p>According to <strong>Seb Goff, Brand Marketing Lead for Digital Appliances at Samsung Electronics UK</strong>, real momentum began with the launch of the refrigerator with <span><a href="https://www.samsung.com/uk/refrigerators/multi-door/rf9000d-rf9000dc-t-style-french-door-21-5inch-family-hub-636l-silver-rf65dg9h0esreu/" target="_blank" rel="noopener">Family Hub</a></span>. It integrated services that could store personal data, like schedules on a calendar, and leveraged Samsung account information. It also allowed users to remotely connect and control their refrigerator via <span><a href="https://www.samsung.com/uk/smartthings/" target="_blank" rel="noopener">SmartThings.</a></span><a href="#_ftn4" name="_ftnref4"><span>[4]</span></a></p>
<p>&nbsp;</p>
<p>“Back then, IoT was still new, and there was limited awareness of the security challenges associated with IoT devices,” Goff notes. “It wasn’t easy to get started. We had to consider what standards and security models would be appropriate for home appliances, and it required significant technological investment.”</p>
<p>&nbsp;</p>
<p>Coincidentally, this was also when a type of malware that infected IoT devices first emerged. The arrival of malware that targeted connected devices, around the same time that Samsung’s IoT refrigerator released, marked a paradigm shift. It drove Samsung to accelerate security research and development.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><strong>The Scope of Security Requirements Is Expanding</strong></h3>
<p>&nbsp;</p>
<p>While the debut of Family Hub raised awareness about the need for appliance security, the expansion of SmartThings deepened the technical demands.</p>
<p>&nbsp;</p>
<p>“There’s simply more to consider,” says Goff. “With SmartThings, some functions may involve basic data exchange, while others could handle more personal information. For example, the Map View feature<a href="#_ftn5" name="_ftnref5"><span>[5]</span></a> allows users to see multiple connected devices at a glance. However, it also means that devices must share data with one another, which increases both the number and complexity of possible use cases.”</p>
<p>&nbsp;</p>
<p><img class="alignnone wp-image-22293 size-full" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/SmartThings-1.png" alt="" width="989" height="546" srcset="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/SmartThings-1.png 989w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/SmartThings-1-768x424.png 768w" sizes="(max-width: 989px) 100vw, 989px" /></p>
<p>&nbsp;</p>
<p>“This shifts the focus from securing individual devices to ensuring inter-device security within a connected environment. Looking ahead, as technologies that incorporate AI continue to advance, even more use cases and threats must be anticipated. That’s why it is becoming increasingly important to establish clear security criteria, which decide how security should be applied and how it must be reflected in product design from the outset.”</p>
<p>&nbsp;</p>
<p>The evolution of product features has also accelerated the adoption of new security technologies. As devices become more advanced and their capabilities expand, security measures must evolve to meet those new demands.</p>
<p>&nbsp;</p>
<p>“Think about robot vacuums,” Goff explains. “In the past, the camera was used for navigation. But the model we now have introduced monitoring features, which brought video security into the mix.<a href="#_ftn6" name="_ftnref6"><span>[6]</span></a> As features evolve, the volume and sensitivity of the data that must be protected increases, and so does the complexity of the technology required.”</p>
<p>&nbsp;</p>
<div id="attachment_22283" style="width: 1389px" class="wp-caption alignnone"><img class="wp-image-22283 size-full" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/Monitor.jpg" alt="" width="1379" height="772" srcset="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/Monitor.jpg 1379w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/Monitor-1000x560.jpg 1000w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/Monitor-768x430.jpg 768w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/Monitor-1024x573.jpg 1024w" sizes="(max-width: 1379px) 100vw, 1379px" /><p class="wp-caption-text">Monitor Your Appliances Through Samsung SmartThings</p></div>
<p>&nbsp;</p>
<p>Over time, Samsung has steadily built up its security technologies and accumulated valuable know-how through a range of experiences. This is why, at a time when security has become a top priority, the company can confidently position it front and centre.</p>
<p>&nbsp;</p>
<p>Furthermore, Samsung has achieved significant advancements in security through its mobile business, which is one of the most personal and security-sensitive product categories. Leveraging these technologies, and with a broad portfolio that spans TVs to mobile devices, the company has been able to extend its security innovations across business divisions, establishing a robust protection framework in home appliances.</p>
<p>&nbsp;</p>
<h3><strong>Are Samsung Appliances Certified as Secure?</strong></h3>
<p>&nbsp;</p>
<p>“The appeal of a smart home lies in how appliances adapt to you and are easy to control,” he added. “But if your personal data is at risk, you simply can’t feel secure. We’ve been consistently investing in this space for over a decade, and we believe that’s why renowned institutions and government bodies have recognised our efforts.”</p>
<p>&nbsp;</p>
<p>In fact, the strength of Samsung’s security system has also been verified with several third-party certifications. As a key example of this, multiple products have been verified at level <span><a href="https://news.samsung.com/uk/samsung-strengthens-smart-home-security-with-additional-diamond-security-ratings-from-ul-solutions-in-2025">“Diamond” under UL Solutions Marketing Claim Verification IoT Security Rating Program</a></span>. To earn this verification, which is the highest level, <em>a product must satisfy 56 detailed criteria, across 33 evaluation items in six core domains</em>.</p>
<p>&nbsp;</p>
<p>These criteria cover a wide range of aspects, including software updates, data encryption, and system management. The evaluation is thorough and designed to ensure compatibility with various international security standards, making it one of the most comprehensive certifications available.</p>
<p>&nbsp;</p>
<div id="attachment_22282" style="width: 1389px" class="wp-caption alignnone"><img class="wp-image-22282 size-full" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/Jet-Bot.jpg" alt="" width="1379" height="773" srcset="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/Jet-Bot.jpg 1379w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/Jet-Bot-1000x561.jpg 1000w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/Jet-Bot-768x431.jpg 768w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/Jet-Bot-1024x574.jpg 1024w" sizes="(max-width: 1379px) 100vw, 1379px" /><p class="wp-caption-text">Bespoke AI Jet Bot Combo</p></div>
<p>&nbsp;</p>
<p>Another area where Samsung demonstrates clear strength is in privacy protection. The company’s Bespoke Jet Bot Combo AI, a vacuum and mop robot cleaner, became the first of its kind to obtain the “Privacy by Design” certification, administered by the Korea Internet &amp; Security Agency (KISA).</p>
<p>&nbsp;</p>
<p>This certification requires that personal data protection be considered throughout the entire lifecycle of a product or service — including planning, production, and disposal — and involves passing <em>71 detailed evaluation criteria across four key domains</em>.</p>
<p>&nbsp;</p>
<p>“As you can see from the number of criteria, even though there may be some overlap, the items are diverse, and the requirements differ slightly for each certification. So, it’s not easy for one product to meet multiple sets of standards simultaneously,” Goff explained. “Fortunately, our robot vacuums already comply with a wide range of IoT standards, so we were able to fulfill the security requirements, which also played a crucial role in protecting user privacy.”</p>
<p>&nbsp;</p>
<p>Further underscoring the company’s leadership in both home appliance technology and data security, Samsung’s robot vacuum cleaner, the <span><a href="https://www.samsung.com/uk/vacuum-cleaners/robot/jet-bot-combo-ai--ai-object-recognition--satin-greige-satin-greige-vr7md97714g-eu/" target="_blank" rel="noopener">Bespoke Jet Bot Combo</a></span>,<a href="#_ftn7" name="_ftnref7"><span>[7]</span></a> and <span><a href="https://www.samsung.com/uk/home-appliances/bespoke-home/" target="_blank" rel="noopener">Bespoke AI Refrigerators</a><a name="_ednref3"></a></span><a href="#_ftn8" name="_ftnref8"><span>[8]</span></a> also received an <span><a href="https://news.samsung.com/uk/samsung-digital-appliances-earns-its-first-tuv-nord-iot-security-certification">IoT security certification from TÜV Nord</a></span>, a global certification organisation based in Germany. TÜV Nord is a globally renowned institution, acknowledged as an IECEE-accredited National Certification Body.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><strong>How is Samsung Making Its Appliances More Secure for The Future?</strong></h3>
<p>&nbsp;</p>
<p>At a recent global conference, Samsung addressed the future of security, introducing <span><a href="https://news.samsung.com/uk/the-first-step-to-a-quantum-safe-future-with-samsung-knox">Post-Quantum Cryptography (PQC)</a></span>,<a href="#_ftn9" name="_ftnref9"><span>[9]</span></a> a new and lesser-known data encryption technology. This type of protection is becoming increasingly necessary because as quantum computing advances, current encryption algorithms may eventually become vulnerable to decryption. To stay ahead of this potential threat, Samsung is implementing PQC within Knox Matrix in home appliances.</p>
<p>&nbsp;</p>
<div id="attachment_22284" style="width: 1389px" class="wp-caption alignnone"><img class="wp-image-22284 size-full" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/PQC.jpg" alt="" width="1379" height="776" srcset="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/PQC.jpg 1379w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/PQC-728x410.jpg 728w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/PQC-1000x563.jpg 1000w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/PQC-768x432.jpg 768w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/11/PQC-1024x576.jpg 1024w" sizes="(max-width: 1379px) 100vw, 1379px" /><p class="wp-caption-text">Post-Quantum Cryptography</p></div>
<p>&nbsp;</p>
<p>While some may question whether it’s too early to be thinking about post-quantum security, Samsung is taking a long-term view to ensure protection is in place for its customers. Home appliances are typically used for around 10 years after purchase. Considering that product lifecycle, Samsung believes it’s critical to prepare now for risks that may become real in the future. That’s the mindset driving its vision for the smart home.</p>
<p>&nbsp;</p>
<p>“If you wait until after data starts leaking, it’s already too late. Our mission is to continue enhancing our security technologies so that consumers can always feel safe and secure when using our products,” said Goff.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><strong>Why Should I Choose A Samsung Appliance?</strong></h3>
<p>&nbsp;</p>
<p>Security is one of many reasons to choose a Samsung Appliance. You can find out a little more in the video below, and on <span><a href="https://www.samsung.com/uk/home-appliances/" target="_blank" rel="noopener">Samsung.com</a></span>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div class="youtube_wrap"><iframe src="https://www.youtube.com/embed/GhYuQoSPQ2A" width="300" height="150" frameborder="0" allowfullscreen="allowfullscreen" data-mce-fragment="1"><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span><span style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" data-mce-type="bookmark" class="mce_SELRES_start"></span></iframe></div>
<div></div>
<p>&nbsp;</p>
<p><em><span style="font-size: small;"><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a> Research from Samsung Electronics, which surveyed over 8,000 Millennial and Gen Z respondents across Europe, including the UK</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref2" name="_ftn2"><span>[2]</span></a> Currently applied to all Wi-Fi enabled appliances launching in 2025 and planned to be expanded to chosen models that launched in 2024 from September 2025.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref3" name="_ftn3"><span>[3]</span></a> Currently applied to appliances with 7-inch or 9-inch AI Home, and AI Family Hub<img src="https://s.w.org/images/core/emoji/11/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> screen launching in 2025, except Bespoke AI Oven.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref4" name="_ftn4"><span>[4]</span></a> Available on Android and iOS devices. A Wi-Fi connection and a Samsung account are required.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref5" name="_ftn5"><span>[5]</span></a> Available on Android and iOS devices. A Wi-Fi connection and a Samsung account are required.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref6" name="_ftn6"><span>[6]</span></a> Available on Samsung devices running Android 11 or later, and may not work on some devices.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref7" name="_ftn7"><span>[7]</span></a> VR7MD97****/**, VR7MD96****/**</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref8" name="_ftn8"><span>[8]</span></a> RM90F**B***, RF90F**A***, RF90F**E***, RM90F**C**, RM90F**D**, RM90F**E**, RM90F**X*, RF90F**B***, RF**DB99***, RF**DB95***, RF**DG9H***</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref9" name="_ftn9"><span>[9]</span></a> PQC is applied to appliances with 7-inch or 9-inch AI Home, and AI Family Hub screen<img src="https://s.w.org/images/core/emoji/11/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> launching in 2025. (except Bespoke AI Oven)</span></em></p>
]]></content:encoded>
																				</item>
					<item>
				<title>Your Privacy, Secured: Inside the Tech Powering More Secure, Personalised Galaxy AI Experiences</title>
				<link>https://news.samsung.com/uk/your-privacy-secured-inside-the-tech-powering-more-secure-personalised-galaxy-ai-experiences?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Mon, 07 Jul 2025 15:26:34 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Galaxy AI]]></category>
		<category><![CDATA[Knox Enhanced Encrypted Protection]]></category>
		<category><![CDATA[One UI 8]]></category>
		<category><![CDATA[Personal Data Engine]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Samsung Knox]]></category>
		<category><![CDATA[Secure Folder]]></category>
		<category><![CDATA[security]]></category>
                <guid isPermaLink="false">https://bit.ly/3TqUzeM</guid>
									<description><![CDATA[The potential of AI is limitless, but to truly unlock the full potential of what it can do, user inputs that power personalised experiences are critical. AI]]></description>
																<content:encoded><![CDATA[<p>The potential of AI is limitless, but to truly unlock the full potential of what it can do, user inputs that power personalised experiences are critical. AI needs to understand you — your preferences and your routines — to deliver a mobile experience that feels like a natural extension of your everyday life.</p>
<p>&nbsp;</p>
<p>Intuitive, context-aware Galaxy AI features bring these personalised experiences to life, transforming your smartphone from a tool to a smart companion that anticipates your needs and offers suggestions designed to make your life more productive, creative and connected.</p>
<p>&nbsp;</p>
<p>To deliver a fully personalised experience, your device naturally needs access to certain data. This is what allows AI to understand you and tailor its responses in ways that are genuinely helpful and suited to your lifestyle. To ensure your personal data is safeguarded in this era of AI, we’re constantly innovating data protection on your device, so that nothing falls into the wrong hands.</p>
<p>&nbsp;</p>
<p><img class="alignnone wp-image-21201 size-full" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/07/Image-for-Feature-Story_Galaxy-AI-Privacy-Series-2_KEEP.png" alt="" width="1440" height="1041" srcset="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/07/Image-for-Feature-Story_Galaxy-AI-Privacy-Series-2_KEEP.png 1440w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/07/Image-for-Feature-Story_Galaxy-AI-Privacy-Series-2_KEEP-779x563.png 779w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/07/Image-for-Feature-Story_Galaxy-AI-Privacy-Series-2_KEEP-768x555.png 768w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/07/Image-for-Feature-Story_Galaxy-AI-Privacy-Series-2_KEEP-1024x740.png 1024w" sizes="(max-width: 1440px) 100vw, 1440px" /></p>
<p>&nbsp;</p>
<h3><strong>Personalization Made Possible with the Personal Data Engine</strong></h3>
<p>Samsung Electronics’ <strong>Personal Data Engine</strong> (PDE)<a href="#_edn1" name="_ednref1"><span><span style="font-size: small;"><sup>[1]</sup></span></span></a> is a key component of safely delivering these highly personal experiences. First introduced with the <span><a href="https://www.samsung.com/uk/smartphones/galaxy-s25-ultra/">Galaxy S25 series</a></span>, the PDE is the powerhouse behind some of Galaxy’s most life-changing AI experiences yet. It works silently behind the scenes to learn from your habits and preferences, resulting in a truly personalised, unique experience.</p>
<p>&nbsp;</p>
<p>Whether it’s <strong>Now Brief</strong><a href="#_edn2" name="_ednref2"><span><span style="font-size: small;"><sup>[2]</sup></span></span></a> guiding you through your day with curated updates or simply finding that one perfect photo in your Gallery with natural language input, Galaxy AI makes every AI-powered action feel seamless. And because the PDE securely processes your data on-device, you can enjoy all the benefits of deeply customised AI — without compromising privacy.</p>
<p>&nbsp;</p>
<h3><strong>Powerful Advancements with Knox Enhanced Encrypted Protection</strong></h3>
<p>To further strengthen the security of Galaxy AI experiences, Samsung developed <strong>Knox Enhanced Encrypted Protection (KEEP)<a href="#_edn3" name="_ednref3"><span><span style="font-size: small;"><sup>[3]</sup></span></span></a></strong> — a powerful new layer of on-device security that protects your most sensitive data without interrupting your experience. First developed for the <strong>PDE</strong>, KEEP now also secures other Galaxy AI features like Smart Suggestions, Now Brief, Samsung Moments and more, running quietly in the background to ensure that each supported app is kept secure.</p>
<p>&nbsp;</p>
<p>Think of your phone like a house. Each app has its own room — separate, but all under the same roof. Then there’s <strong>Secure Folder</strong>,<a href="#_edn4" name="_ednref4"><span><span style="font-size: small;"><sup>[4]</sup></span></span></a> which works like a fully detached guesthouse with its own key, set apart from the main home. It’s great for keeping certain things extra private, especially when you want complete isolation from the rest of your device. But as AI features like the PDE start handling more sensitive tasks in real time, there’s a growing need for security that’s just as strong, yet more connected to your everyday experience.</p>
<p>&nbsp;</p>
<p>That’s where KEEP comes in. Imagine turning part of the house into a private suite — still under the same roof, but with its own secure entrance that only you can use. It’s more private than a regular room, but not completely separate like the guesthouse. KEEP works the same way: it creates a secure, dedicated space for individual apps — like the PDE — so it can safely handle your data without sending it anywhere or getting in the way of how you use your phone.</p>
<p>&nbsp;</p>
<p>As our mobile experiences become more intelligent, KEEP ensures your most personal data stays safe by design. Together with tools like Secure Folder, it reinforces Samsung’s multi-layered approach to data protection — giving both users and services the right type of security for different privacy needs.</p>
<p>&nbsp;</p>
<p>With Galaxy AI becoming more personal, features like the Personal Data Engine and Knox Enhanced Encrypted Protection are setting a new standard for mobile intelligence — where personalisation and privacy go hand in hand. As these experiences grow smarter and more attuned to your needs, you can rest assured that your most sensitive information will stay secure on your device, exactly where it belongs.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><em><span style="font-size: small;"><a href="#_ednref1" name="_edn1"><span>[1]</span></a>The Personal Data Engine functions when the Personal Data Intelligence menu is on. Analyzed data will be deleted once the Personal Data Intelligence menu is turned off.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ednref2" name="_edn2"><span>[2]</span></a>Now Brief feature requires a Samsung Account login. Service availability may vary by country, language, device model and apps. Some features may require a network connection.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ednref3" name="_edn3"><span>[3]</span></a>Available on Galaxy smartphones and tablets with One UI 8 or later.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ednref4" name="_edn4"><span>[4]</span></a>Secure Folder offers users a separate and protected area of their phone or tablet to store sensitive apps and data. It allows users to set up separate profiles which can duplicate your apps. Users can customize the Secure Folder app and set up their own lock type, including PIN, pattern, password and fingerprint. For enhanced security, Secure Folder users are also provided with an option to hide and encrypt the Secure Folder, which helps keep data safe from advanced cybersecurity threats. While hidden, the apps will stop working to keep your data safe. Once the Secure Folder is opened again, the encryption will be deactivated, and the apps will resume normal operation.</span></em></p>
]]></content:encoded>
																				</item>
					<item>
				<title>Samsung Introduces Future-Ready Mobile Security for Personalised AI Experiences</title>
				<link>https://news.samsung.com/uk/samsung-introduces-future-ready-mobile-security-for-personalised-ai-experiences?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Mon, 07 Jul 2025 13:37:01 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Galaxy AI]]></category>
		<category><![CDATA[Knox Enhanced Encrypted Protection]]></category>
		<category><![CDATA[One UI 8]]></category>
		<category><![CDATA[Personal Data Engine]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Samsung Knox]]></category>
		<category><![CDATA[Samsung Knox Matrix]]></category>
		<category><![CDATA[security]]></category>
                <guid isPermaLink="false">https://bit.ly/3Gw1Wi0</guid>
									<description><![CDATA[&#160; &#160; Samsung Electronics Co., Ltd. today announced a new set of security and privacy updates rolling out with its upcoming Samsung Galaxy smartphones]]></description>
																<content:encoded><![CDATA[<p><img class="alignnone size-medium wp-image-21192" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/07/Image-for-Press-Release_One-UI-8-Security-Innovations_Thumbnail-845x563.jpg" alt="" width="845" height="563" srcset="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/07/Image-for-Press-Release_One-UI-8-Security-Innovations_Thumbnail-845x563.jpg 845w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/07/Image-for-Press-Release_One-UI-8-Security-Innovations_Thumbnail-768x512.jpg 768w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/07/Image-for-Press-Release_One-UI-8-Security-Innovations_Thumbnail-1024x683.jpg 1024w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/07/Image-for-Press-Release_One-UI-8-Security-Innovations_Thumbnail.jpg 1440w" sizes="(max-width: 845px) 100vw, 845px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Samsung Electronics Co., Ltd. today announced a new set of security and privacy updates rolling out with its upcoming Samsung Galaxy smartphones with One UI 8. These updates reinforce Samsung’s commitment to delivering powerful, trusted mobile technology in a rapidly evolving digital world by introducing new protections for on-device AI, expanding cross-device threat detection and enhancing network security with quantum-resistant encryption.</p>
<p>&nbsp;</p>
<h3>Next -Generation Mobile Security For AI Personalisation</h3>
<p>Samsung is introducing <a href="https://news.samsung.com/uk/your-privacy-secured-inside-the-tech-powering-more-secure-personalised-galaxy-ai-experiences"><strong>Knox Enhanced Encrypted Protection, </strong></a><a href="#_edn1" name="_ednref1"><span><span style="font-size: small;"><sup>[1]</sup></span></span></a> a new architecture designed to safeguard the next generation of personalised, AI-powered features, as its latest innovation in mobile security. KEEP creates encrypted, app-specific storage environments within the device’s secure storage area, ensuring that each app can access only its own sensitive information and nothing more.</p>
<p>&nbsp;</p>
<p>Supporting Galaxy’s <span><a href="https://news.samsung.com/uk/samsung-galaxy-s25-series-sets-the-standard-of-ai-phone-as-a-true-ai-companion"><strong>Personal Data Engine (PDE)</strong></a></span>,<a href="#_edn2" name="_ednref2"><span><span style="font-size: small;"><sup>[2]</sup></span></span></a> KEEP helps secure a user’s deeply personal insights – such as routines and preferences – that enable features like Now Brief and Smart Gallery search. These insights stay entirely <span><a href="https://www.samsungmobilepress.com/feature-stories/the-knox-journals-stay-in-control-of-your-security-your-data-used-exactly-how-you-see-fit">on-device</a></span>, protected by KEEP and further secured by <span><a href="https://news.samsung.com/uk/your-privacy-secured-inside-the-tech-powering-more-secure-personalised-galaxy-ai-experiences"><strong>Knox Vault</strong></a></span>, Samsung’s tamper-resistant hardware security environment. The result is a seamless foundation for Galaxy AI that delivers personalised intelligence while keeping data tightly contained and under the user’s control.</p>
<p>&nbsp;</p>
<p>KEEP’s system-level structure allows it to scale across Galaxy AI innovations. In addition to PDE, it now protects Now Brief, Smart Suggestions and other on-device features that rely on user-specific inputs – enabling more advanced AI experiences without compromising privacy. With KEEP, Samsung is redefining how mobile devices safeguard data in the background to elevate privacy from a setting to an embedded design principle.</p>
<p>&nbsp;</p>
<h3>Smarter, More Connected Threat Response with Knox Matrix</h3>
<p>As AI becomes more integrated across the ecosystem, Samsung is advancing protections that offer not just stronger security, but greater transparency and control for users, with <span><a href="https://news.samsung.com/uk/samsung-one-ui-7-enhances-security-and-privacy-in-the-age-of-ai-giving-users-greater-transparency-and-choice"><strong>Knox Matrix</strong></a></span> leading the way. Through One UI 8, Samsung is evolving Knox Matrix to deliver more proactive and user-friendly protection for connected Galaxy devices. When a device is flagged for serious risk – such as system manipulation or identity forgery – it is designed to automatically sign out of the Samsung Account, cutting off access to cloud-connected services to prevent threats from spreading.<a href="#_edn3" name="_ednref3"><span><span style="font-size: small;"><sup>[3]</sup></span></span></a></p>
<p>&nbsp;</p>
<p>Users are notified across their connected Galaxy devices and guided to the ‘<strong>Security status of your devices</strong>’ page, where they can review the issue and take action. Even devices without the latest security status updates trigger a yellow-level warning, helping users respond before vulnerabilities grow.</p>
<p>&nbsp;</p>
<p>Together, these updates make Samsung Galaxy’s ecosystem-level protection more dynamic, intuitive and visible, empowering users to maintain trust across all their devices with more confidence and clarity.</p>
<p>&nbsp;</p>
<h3>Secure Wi-Fi Strengthened with Quantum-Resistant Encryption</h3>
<p>In continuation of its commitment to quantum-safe security, Samsung is bringing post-quantum cryptography to <span><a href="https://www.samsungmobilepress.com/feature-stories/safeguarding-your-online-privacy-with-galaxy-security"><strong>Secure Wi-Fi</strong></a></span>,<a href="#_edn4" name="_ednref4"><span><span style="font-size: small;"><sup>[4]</sup></span></span></a>extending the trusted approach first introduced on the Galaxy S25 series through <span><a href="https://news.samsung.com/uk/the-first-step-to-a-quantum-safe-future-with-samsung-knox">Post-Quantum Enhanced Data Protection (EDP)</a></span>. Secure Wi-Fi is now being upgraded with a new cryptographic framework<a href="#_edn5" name="_ednref5"><span><span style="font-size: small;"><sup>[5]</sup></span></span></a> designed to strengthen network protection against emerging threats, particularly those anticipated in the era of quantum computing. This enhancement secures the key exchange process at the core of encrypted connections, helping ensure robust privacy even over public networks.</p>
<p>&nbsp;</p>
<p>Quantum computing, once fully realised, could undermine many of today’s data protection methods. By integrating post-quantum cryptography, Secure Wi-Fi is built to withstand future attacks that capture encrypted data with the intent to break it once quantum technology matures – a tactic known as “harvest now, decrypt later.” This upgrade fortifies the secure tunnel between Galaxy devices and Samsung servers, reinforcing the integrity of data transmissions in high-risk environments like public Wi-Fi.</p>
<p>&nbsp;</p>
<p>In addition to this future-ready foundation, Secure Wi-Fi offers a suite of advanced privacy features:</p>
<p>&nbsp;</p>
<ul>
<li><strong>Auto Protect</strong>: Automatically activates in public places like cafés, airports or hotels, securing Wi-Fi connections without requiring user action.</li>
<li><strong>Enhanced Privacy Protection (EPP)</strong>: Encrypts internet traffic and routes it through multiple layers, combining packet encryption and relay to anonymise device information and help prevent tracking.</li>
<li><strong>Protection Activity</strong>: Provides visibility into protection history by showing which apps and networks were secured and how much data was encrypted over time.</li>
</ul>
<p>&nbsp;</p>
<h3>A Trusted Platform with Built-In Safeguards</h3>
<p>In addition to its latest innovations, Samsung continues to strengthen the core protections that underpin the Galaxy experience. These features reflect a multi-layered security approach that protects across hardware and software, while giving users greater visibility and control:</p>
<p>&nbsp;</p>
<ul>
<li><span><a href="https://news.samsung.com/uk/your-privacy-secured-inside-the-tech-powering-more-secure-personalised-galaxy-ai-experiences"><strong>Knox Vault</strong></a></span> secures sensitive credentials such as passwords, PINs and biometrics in a physically isolated environment, helping to keep them protected even if the main operating system is compromised.</li>
<li><span><a href="https://www.samsungmobilepress.com/feature-stories/the-knox-journals-how-galaxy-invisibly-keeps-you-safe-at-all-times"><strong>Auto Blocker</strong></a></span> helps provide defense by default, blocking unauthorised app installs, restricting command-based attacks and mitigating risks from potential zero-click threats.</li>
<li><span><a href="https://www.samsungmobilepress.com/feature-stories/the-knox-journals-stay-in-control-of-your-security-your-data-used-exactly-how-you-see-fit"><strong>Advanced Intelligence Settings</strong></a></span> gives users the option to turn off online data processing for AI features, so personal information can stay on-device, fully under their control.</li>
<li><span><a href="https://news.samsung.com/uk/samsung-one-ui-7-enhances-security-and-privacy-in-the-age-of-ai-giving-users-greater-transparency-and-choice"><strong>Enhanced Theft Protection</strong></a></span> helps protect personal data even in high-risk situations such as robbery, using safeguards like <span><a href="https://news.samsung.com/uk/samsung-urges-customers-to-activate-latest-anti-theft-features-to-help-tackle-phone-theft-crime">Identity Check and Security Delay</a></span> to prevent unauthorised access.</li>
</ul>
<p>&nbsp;</p>
<p>This latest set of updates reinforces Samsung’s long-standing commitment to mobile security that evolves with innovation. It strengthens on-device privacy for personalised AI with <a href="https://samsungmobilepress.com/feature-stories/your-privacy-secured-inside-the-tech-powering-safe-personalized-galaxy-ai-experiences">KEEP,</a> expands transparency and user control through Knox Matrix, and introduces quantum-resistant protection to Secure Wi-Fi for a more future-ready Galaxy experience. As new security challenges emerge, Samsung remains focused on delivering safeguards that are built in, always on and ready for what’s next.</p>
<p>&nbsp;</p>
<p><em><span style="font-size: small;"><a href="#_ednref1" name="_edn1"><span>[1]</span></a>Available on Galaxy smartphones and tablets with One UI 8 or later.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ednref2" name="_edn2"><span>[2]</span></a>The Personal Data Engine functions when the Personal Data Intelligence menu is on. Analysed data will be deleted once the Personal Data Intelligence menu is turned off.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ednref3" name="_edn3"><span>[3]</span></a>Available on Galaxy smartphones and tablets with One UI 8 or later. Availability may vary by model and/or market.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ednref4" name="_edn4"><span>[4]</span></a>Secure Wi-Fi offers free protection of up to 1024MB per month for Android OS 13 or later, and 250MB per month for Android OS 12 or earlier versions. Availability details may vary by market or network provider and connectivity is subject to applicable network environments.</span>&lt;/em</em></p>
<p><em><span style="font-size: small;"><a href="#_ednref5" name="_edn5"><span>[5]</span></a>Secure Wi-Fi offers free protection of up to 1024MB per month for Android OS 13 or later, and 250MB per month for Android OS 12 or earlier versions. Availability details may vary by market or network provider and connectivity is subject to applicable network environments.</span>&lt;/em</em></p>
]]></content:encoded>
																				</item>
					<item>
				<title>Your Privacy, Secured: How Galaxy AI Protects Privacy with Samsung Knox Vault</title>
				<link>https://news.samsung.com/uk/your-privacy-secured-how-galaxy-ai-protects-privacy-with-samsung-knox-vault?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Thu, 19 Jun 2025 14:33:08 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Galaxy AI]]></category>
		<category><![CDATA[Galaxy devices]]></category>
		<category><![CDATA[Knox Matrix]]></category>
		<category><![CDATA[Knox Vault]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[security]]></category>
                <guid isPermaLink="false">https://bit.ly/4nab8cq</guid>
									<description><![CDATA[Galaxy AI is built to understand what you need before you even ask, whether that’s suggesting a change in your routine or pulling up just the right information]]></description>
																<content:encoded><![CDATA[<p><strong>Galaxy AI</strong> is built to understand what you need before you even ask, whether that’s suggesting a change in your routine or pulling up just the right information at the right time.</p>
<p>&nbsp;</p>
<p>This level of personalisation can be incredibly helpful, but the more your phone knows, the more there is to protect. So, what’s keeping all that personal data secure?</p>
<p>&nbsp;</p>
<p>Samsung believes there is no privacy without strong security. That’s why every Galaxy device is protected from the chip up by a multi-layered approach, which includes <span><a href="https://news.samsung.com/uk/the-knox-journals-stay-in-control-of-your-security-your-data-used-exactly-how-you-see-fit">on-device</a></span> personalisation, user-controlled cloud processing, and ecosystem-wide protection through Samsung <span><a href="https://news.samsung.com/uk/samsung-one-ui-7-enhances-security-and-privacy-in-the-age-of-ai-giving-users-greater-transparency-and-choice">Knox Matrix</a></span>.</p>
<p>&nbsp;</p>
<p>At the core of this system is Samsung <span><a href="https://www.samsungmobilepress.com/feature-stories/samsung-brings-next-level-security-to-galaxy-s21-series-with-samsung-knox-vault">Knox Vault</a></span>, the company’s hardware-based solution for securing your most sensitive information.</p>
<p>&nbsp;</p>
<p><img class="alignnone size-medium wp-image-21027" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/06/001-SecurityPrivacy-Feature-Series-1-Knox-Vault-for-AI-News-Body-845x563.jpg" alt="" width="845" height="563" srcset="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/06/001-SecurityPrivacy-Feature-Series-1-Knox-Vault-for-AI-News-Body-845x563.jpg 845w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/06/001-SecurityPrivacy-Feature-Series-1-Knox-Vault-for-AI-News-Body-768x512.jpg 768w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/06/001-SecurityPrivacy-Feature-Series-1-Knox-Vault-for-AI-News-Body-1024x683.jpg 1024w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/06/001-SecurityPrivacy-Feature-Series-1-Knox-Vault-for-AI-News-Body.jpg 1440w" sizes="(max-width: 845px) 100vw, 845px" /></p>
<p>&nbsp;</p>
<h3><strong>Secured at the Hardware Level</strong></h3>
<p>&nbsp;</p>
<p>Most mobile devices rely solely on software to protect sensitive data. Galaxy devices go further.</p>
<p>&nbsp;</p>
<p><span><a href="https://news.samsung.com/uk/the-knox-journals-the-passwordless-future-of-security">Knox Vault</a></span> is a hardware-level security solution that creates a physical barrier between your most private information and everything else. It works like a locked room inside your phone, <strong><em>with its own processor and memory</em></strong><strong><em> to encrypt sensitive data, with Knox Vault securing the keys.</em></strong> It pairs a secure processor with dedicated memory, isolating your passwords, PINs, biometrics, as well as financial information and cryptographic keys. These are the kinds of details you don’t want anyone else to access, and Knox Vault is built to make sure they stay private. You don’t need to activate or manage it, as it’s always on, working silently in the background, keeping your data safe while you get on with your day.</p>
<p>&nbsp;</p>
<p>This is particularly crucial in the age of AI as user concerns are expanding from traditional cybersecurity threats, like viruses and malware, to worries over leaking personal data, such as conversations with your AI assistant. And as AI becomes part of more everyday tasks, the types of data that need protection are also expanding.</p>
<p>&nbsp;</p>
<p>For example, metadata from your most personal photos not only details the resolution and file format, but also shows the exact location where the image was taken. This personal metadata is more than just files — it’s information that is deeply connected to your daily life. And in the era of AI, these types of data used to provide personalised suggestions needs to be kept private.</p>
<p>&nbsp;</p>
<p>Knox Vault helps mitigate these growing concerns by safely storing personal information in a secure, hardware-isolated environment designed to block both physical tampering and remote attacks, ensuring your data can’t be accessed without approval.</p>
<p>&nbsp;</p>
<h3><strong>Personalised AI, Protected at the Core</strong></h3>
<p>&nbsp;</p>
<p>Knox Vault also ensures your privacy as mobile experiences continue to evolve.</p>
<p>&nbsp;</p>
<p>As Galaxy AI becomes more useful, it also becomes more personal, learning how you use your device and adapting to your needs. And because these highly tailored AI experiences rely on deeply personal data, Knox Vault plays a crucial role in keeping that information private and secured.</p>
<p>&nbsp;</p>
<p>Galaxy AI ensures privacy by processing tasks directly on-device where possible, keeping data in your hands and off online servers. For example, Audio Eraser,<a href="#_ftn1" name="_ftnref1"><span>[1]</span></a> removes background noise from videos or voice recordings without the need for any cloud-based processing — so your personal information stays private. Call Transcript<a href="#_ftn2" name="_ftnref2"><span>[2]</span></a> operates in the same way, keeping your calls organised while ensuring personal conversations stay private by remaining on-device.<span style="text-decoration: line-through;"></span></p>
<p>&nbsp;</p>
<p>Knox Vault ensures your data is protected, confidential, and secure. Building on its role in Galaxy AI as the trusted foundation for security and privacy, Knox Vault will expand across Samsung’s growing AI ecosystem as AI becomes more deeply integrated into the user experience.</p>
<p>&nbsp;</p>
<p>Knox Vault is more than a security feature, it’s Galaxy’s promise that no matter how advanced your devices become, or how much AI evolves, your privacy is more secure.</p>
<p>&nbsp;</p>
<p><em><span style="font-size: small;"><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a> Samsung account login required. Six types of sound can be detected; voices, music, wind, nature, crowd and noise. Results may vary depending on audio source &amp; condition of the video.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref2" name="_ftn2"><span>[2]</span></a> Samsung account login is required. Requires network connection.</span></em></p>
]]></content:encoded>
																				</item>
					<item>
				<title>Samsung Urges Customers to Activate Latest Anti-Theft Features to Help Tackle Phone Theft Crime</title>
				<link>https://news.samsung.com/uk/samsung-urges-customers-to-activate-latest-anti-theft-features-to-help-tackle-phone-theft-crime?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Mon, 02 Jun 2025 09:00:10 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Anti-theft]]></category>
		<category><![CDATA[Knox Security]]></category>
		<category><![CDATA[Lost Phone]]></category>
		<category><![CDATA[Phone Theft]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Stolen Phone]]></category>
		<category><![CDATA[Theft Protection]]></category>
                <guid isPermaLink="false">https://bit.ly/3ZH5ZOS</guid>
									<description><![CDATA[LONDON, U.K. – June 02, 2025: Samsung is today encouraging smartphone users across the UK to enable and update the latest anti-theft features available on]]></description>
																<content:encoded><![CDATA[<p><strong>LONDON, U.K. – June 02, 2025:</strong> Samsung is today encouraging smartphone users across the UK to enable and update the latest anti-theft features available on Samsung Galaxy devices. This activity supports the UK Home Office’s ongoing work to drive new nationwide action to tackle mobile phone thefts.</p>
<p>&nbsp;</p>
<p>Samsung issued a public safety security message alert today, which will reach all over 40m Samsung Account holders in the UK this week, through customer communication channels and the Samsung Members platform.</p>
<p>&nbsp;</p>
<p>This outreach will be reinforced through UK social channels and Samsung has also committed significant marketing spend this week, launching an awareness campaign around the privacy features available on the Samsung Knox Security Platform. The privacy campaign will feature at Samsung’s Piccadilly Lights space, through OOH adverts in tube stations and train stations in central London and content across OLV, CTV and BVOD channels.</p>
<p>&nbsp;</p>
<p>Samsung recently started rolling out <a href="https://www.samsungmobilepress.com/press-releases/samsung-one-ui-7-enhances-security-and-privacy-in-the-age-of-ai-giving-users-greater-transparency-and-choice/">One UI 7</a> with security updates to existing features, including additional theft-protection and security delay anti-robbery features. These features will now also be available to even more devices, having starting with the launch of the Galaxy S25 series in February, and now rolling out to further Galaxy series smartphones throughout this year.</p>
<p>&nbsp;</p>
<p><strong>Annika Bizon</strong>, <strong>Mobile Experience (MX) VP of Product and Marketing, UK&amp;I at Samsung,</strong> spoke on the issue of phone theft: “Samsung is deeply committed to working closely with the Home Office on the issue of mobile phone theft and related crimes and we’re in constant collaboration with our partners across the industry, to look at new and existing solutions to help combat this complex issue and ultimately help improve the safety of mobile phone users.</p>
<p>&nbsp;</p>
<p>“Our recent One UI 7 update built further on existing protections with new anti-theft features such as identity check, biometric authentication and security delay, all featured in our latest Galaxy S25 series. These features have now also been rolled out into a range of models across our devices and further updates will follow. We must do everything we can to ensure the safety and security of our customers when they are using their mobile devices and we will continue to work hard to ensure our customers are aware of the wide range of security features available to them.”</p>
<p>&nbsp;</p>
<p>Samsung is introducing new <a href="https://www.samsungmobilepress.com/feature-stories/the-knox-journals-how-galaxy-invisibly-keeps-you-safe-at-all-times">security updates</a> to better protect users in the event of phone theft. One critical update is <strong>Theft Protection</strong> – a multi-layered suite of features developed to safeguard personal data, even in high-risk situations such as robbery.</p>
<p>&nbsp;</p>
<p>Theft Protection builds on standard Android safeguards, which are effective in typical theft scenarios where the thief doesn’t know the PIN. With One UI 7, Samsung goes further by introducing additional protections that anticipate more serious threats, including cases where access credentials may have been exposed.</p>
<p>&nbsp;</p>
<p>Galaxy users can now enable a range of new security measures, including <strong>Identity Check</strong>, designed to offer stronger protection in complex theft scenarios. These features respond automatically and intelligently to suspicious activity, helping ensure that personal data remains secure and under the user’s control in these critical moments.</p>
<p>Existing and updated features in <strong>Theft Protection</strong> include:</p>
<p>&nbsp;</p>
<ul>
<li><strong>Theft Detection Lock: </strong>Uses machine learning to detect motions associated with theft such as snatching, and instantly locks the screen to stop unauthorised access.</li>
<li><strong>Offline Device Lock: </strong>Automatically locks the screen if the device is disconnected from the network for an extended period, ensuring protection even when the device is offline.</li>
<li><strong>Remote Lock: </strong>If the device has already been stolen, users can lock it remotely using their phone number and a quick verification step. Remote Lock also allows users to regain control of their account and explore additional recovery options.</li>
</ul>
<p>&nbsp;</p>
<p><strong>New </strong><strong>Anti-</strong><strong>Robbery Features </strong>released on One UI 7 include:</p>
<ul>
<li><strong>Identity Check: </strong>In unfamiliar locations, the ‘Safe Places’ feature requires biometric authentication for any changes to sensitive security settings, adding an additional layer of protection when a PIN may have been compromised.</li>
<li><strong>Security Delay: </strong>If a robber attempts to reset biometric data, a one-hour delay immediately gets activated before any changes take effect. This crucial buffer gives Samsung customers time to lock the stolen phone from a connected device, such as a PC or tablet, before unauthorised access can occur.</li>
</ul>
<p>&nbsp;</p>
<p>These updated theft features are now becoming available on previous flagship devices, starting with the Galaxy S24 series, Galaxy Z Fold6, Z Flip6, Z Fold5, Z Flip 5, S23 and S22 series currently,  with future updates planned for even more Galaxy smartphones.</p>
<p>&nbsp;</p>
<p>To set up the latest anti-theft features, users in the UK can contact Samsung here:</p>
<ul>
<li>Visit: <a href="https://www.samsung.com/uk/support/contact/">samsung.com/uk/support/contact</a></li>
<li>Call us: 0333 000 0333</li>
<li>Live Chat: <a href="https://www.samsung.com/uk/support/chat-members/">samsung.com/uk/support/chat-members</a></li>
</ul>
<p>&nbsp;</p>
<p>For guidance on setting up a Galaxy device with the latest anti-theft features, please visit:</p>
<p><a href="https://www.samsung.com/uk/support/mobile-devices/how-to-use-security-settings/">How to use security settings on your phone | Samsung UK</a></p>
<p>&nbsp;</p>
<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;</p>
<p>&nbsp;</p>
<p><strong><u>Further steps </u></strong><strong><u>to take</u></strong><strong><u> if you</u></strong><strong><u>r</u></strong><strong><u> Samsung Galaxy device is lost or stolen</u></strong></p>
<p>&nbsp;</p>
<p><strong>How </strong><strong>to</strong> <strong>remotely lock your Samsung Galaxy device:</strong></p>
<ul>
<li>Sign into <a href="https://samsungfind.samsung.com">Samsung Find</a> using your Samsung account</li>
<li>Select your phone on the left-hand side of the page, then choose Lost Mode in the device details section</li>
<li>Create a <strong>PIN </strong>to unlock your phone if recovered, and enter it twice to confirm</li>
<li>You will have the option to add an emergency contact and a custom message that will display on the locked screen (It’s recommended to skip this step to avoid sharing personal contact details)</li>
<li>When you are ready, select the Lock button and verify your Samsung account to activate Lost mode</li>
<li>If your device is recovered, you can unlock it using the PIN that was created when setting lost mode on your device</li>
</ul>
<p>&nbsp;</p>
<p><strong>How to remotely delete data on your Samsung Galaxy device: </strong></p>
<ul>
<li>Visit the <a href="https://samsungfind.samsung.com/">Samsung Find</a><strong> w</strong>ebsite</li>
<li>Select the phone you want to erase and choose <strong>Erase Data</strong></li>
<li>Verify your Samsung account credentials</li>
</ul>
<p>Review the information provided and tap <strong>Erase</strong><strong> to confirm</strong></p>
<ul>
<li><strong>All the data on your mobile, including Samsung Pay information, will be permanently deleted and cannot be recovered</strong></li>
<li>This will also reset your phone, meaning you won’t be able to locate and control it via Samsung Find</li>
<li>Make sure to regularly back up your data to the cloud so you can restore it to a new device if needed</li>
</ul>
<p>&nbsp;</p>
<p><strong>How to remotely change your Samsung and/or Google account</strong> <strong>passwords: </strong></p>
<ul>
<li>It is recommended to <strong>change the password</strong><strong>s</strong> for <strong>your Samsung and Google accounts</strong> (or whichever accounts are linked to your device) by signing in through their respective websites</li>
<li>Once changed, you will be<strong> signed out </strong>of all connected devices, except the one you’re using</li>
<li>This prevents unauthorised access to account-linked features and protects your personal information</li>
</ul>
<p>&nbsp;</p>
<p><strong>How </strong><strong>to</strong> <strong>track your Galaxy device:</strong></p>
<p>If your device is turned on and connected to Wi-Fi or mobile data, its last known location will appear on a map<strong> </strong></p>
<ul>
<li>Visit the <a href="https://samsungfind.samsung.com/">Samsung Find</a><strong> w</strong>ebsite</li>
<li>Sign in with the Samsung account associated with your device (or a guardian’s account)</li>
<li>If multiple devices are linked to your account, they will all appear – select the one you want to locate</li>
<li><strong>You’ll</strong> see its current or last known location</li>
</ul>
<p>&nbsp;</p>
<p><strong>Other</strong> <strong>remote </strong><strong>features</strong><strong> available: </strong></p>
<ul>
<li><strong>Ring</strong><strong>: </strong>Make your device ring even if it’s set to silent or vibrate</li>
<li><strong>Extend battery life</strong><strong>: </strong>Activate power-saving settings to keep your device on longer and improve the chances of recovery</li>
<li><strong>Track location: </strong>Enable real-time location tracking and your phone’s location will update every 15 minutes until tracking is stopped</li>
</ul>
<p><strong> </strong></p>
<p><strong><u>Other ways to locate Galaxy </u></strong><strong><u>devices</u></strong></p>
<p>&nbsp;</p>
<p><strong>Find</strong><strong> your phone using your Galaxy watch (WearOS 5 or higher)</strong><strong>:</strong></p>
<ul>
<li>Swipe down from the top of your Galaxy Watch to open Quick settings</li>
<li>Tap the <strong>Find My Phone icon</strong></li>
<li>Tap <strong>Start </strong>to begin the search – your phone’s ringtone will sound</li>
<li>Once found, tap Stop on your watch or the X icon on your phone</li>
</ul>
<p>&nbsp;</p>
<p><strong>F</strong><strong>ind your Galaxy Watch: </strong></p>
<ul>
<li>Open the <strong>Galaxy Wearable app </strong>on your phone</li>
<li>Tap <strong>Find My Watch</strong> (or <strong>Find My Band</strong> / <strong>Find My Gear</strong><strong>, depending on your device)</strong></li>
<li>If connected via Bluetooth, tap <strong>Start</strong></li>
<li>Your watch will vibrate and play a sound (depending on model)</li>
<li>Once found, tap the <strong>X </strong>icon on your watch or <strong>S</strong><strong>top</strong> on your phone</li>
</ul>
<p>&nbsp;</p>
<p><strong>F</strong><strong>ind your Galaxy Buds: </strong></p>
<ul>
<li>Open the <strong>Galaxy Wearable app </strong>on your phone or tablet</li>
<li>Tap <strong>Find My Earbuds</strong></li>
<li>Tap <strong>Start</strong> – your earbuds will begin beeping and gradually increase in volume for three minutes</li>
<li>Once found, tap <strong>Stop</strong></li>
</ul>
<p>&nbsp;</p>
<p><strong>U</strong><strong>sing Google’s Find My Device:</strong></p>
<ul>
<li>Google’s Find My Device is built into Android via Google Play Services</li>
<li>You will need a Google account to use it</li>
<li>With this tool, you can set a new password, make your device ring, display a message, lock and wipe your device, and more</li>
</ul>
<p>&nbsp;</p>
<p><strong>Contact the authorities and your </strong><strong>mobile </strong><strong>network provider: </strong></p>
<ul>
<li>Once taken the steps above, report your lost or stolen device to the police and record a crime incident report</li>
<li>Contact your mobile network provider to freeze your contract and prevent unauthorized usage</li>
</ul>
<p>&nbsp;</p>
<p>For additional device protection, it is recommended to have insurance that covers accidental damage, loss, or theft. Samsung offers a variety of protection plans – visit <a href="https://www.samsung.com/uk/">Samsung.com</a> to explore coverage options that best suit your needs.</p>
]]></content:encoded>
																				</item>
					<item>
				<title>Knox Suite Now Available in Scalable Packages, Supporting Enterprises of All Sizes and Industries</title>
				<link>https://news.samsung.com/uk/knox-suite-now-available-in-scalable-packages-supporting-enterprises-of-all-sizes-and-industries?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Thu, 16 Jan 2025 13:09:50 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Galaxy devices]]></category>
		<category><![CDATA[Samsung Knox]]></category>
		<category><![CDATA[Samsung Knox Suite]]></category>
		<category><![CDATA[security]]></category>
                <guid isPermaLink="false">https://bit.ly/42cQKPX</guid>
									<description><![CDATA[&#160; LONDON, U.K. – Jan 16 2025: Samsung Electronics Co., Ltd. today announced updates to Knox Suite, an all-in-one business solution package designed to]]></description>
																<content:encoded><![CDATA[<p><img class="alignnone size-large wp-image-19444" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/01/Knox-Suite-Enterprise-Plan_Samsung_KV-1024x546.jpg" alt="" width="1024" height="546" srcset="https://img.global.news.samsung.com/uk/wp-content/uploads/2025/01/Knox-Suite-Enterprise-Plan_Samsung_KV-1024x546.jpg 1024w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/01/Knox-Suite-Enterprise-Plan_Samsung_KV-1000x533.jpg 1000w, https://img.global.news.samsung.com/uk/wp-content/uploads/2025/01/Knox-Suite-Enterprise-Plan_Samsung_KV-768x410.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>&nbsp;</p>
<p><strong>LONDON, U.K. – Jan 16 2025:</strong> Samsung Electronics Co., Ltd. today announced updates to Knox Suite, an all-in-one business solution package designed to manage and secure enterprise devices. Previously only available as one comprehensive package, Knox Suite now offers flexible plans — Base, Essentials and Enterprise — that cater to the diverse security and device management needs of businesses of all sizes, from small start-ups to large enterprises managing thousands of devices.<a href="#_ftn1" name="_ftnref1"><sup><span style="font-size: small;"><sup>[1]</sup></span></sup></a></p>
<p>&nbsp;</p>
<p>As a comprehensive security and management framework leveraged and trusted by over 35,000 businesses across 134 countries, Samsung Knox is essential for organisations using Samsung Galaxy devices as it unlocks their full operational potential. Built on Samsung’s industry-leading Samsung Knox security platform, Knox Suite delivers robust protection, simplifies IT workflows and provides actionable insights that drive efficiency and productivity.</p>
<p>&nbsp;</p>
<p>“Enterprises of varying sizes and industries have diverse device management needs, but ultimately are looking toward the same end goal – enabling secure, productive mobile workspaces,” said Jerry Park, EVP and Head of B2B Team, Mobile eXperience Business at Samsung Electronics. “That’s why we’re introducing flexible options within Knox Suite, designed to provide businesses with the tailored tools they need. Through these new scalable solutions, Knox Suite is now optimised for all types of operational use cases, empowering businesses to comprehensively and intelligently manage enterprise ecosystems.”</p>
<p>&nbsp;</p>
<h3><strong>Scalable Solutions Enhance Device Management</strong></h3>
<p>With Knox Suite Plans, businesses can optimise and securely manage their Samsung Galaxy device ecosystems, enhancing IT efficiency and empowering employees to maximise productivity throughout the device lifecycle. With its presence in UEM market, Samsung was named a Major Player in the IDC MarketScape: Worldwide Unified Endpoint Management Software 2024 Vendor Assessment (doc #US51234224, April 2024). Knox Suite is trusted by customers worldwide. Now more customisable than ever, Knox Suite is available in three plans:</p>
<ul>
<li><strong>Knox Suite – Base Plan:</strong> Included with Samsung Galaxy device purchases at no additional cost, the Knox Suite – Base Plan is ideal for businesses seeking simple and secure set-up of managed business devices. IT administrators can add Samsung devices into their Enterprise Mobility Management (EMM) solutions without the hassle of manual enrolment, and ensure devices and data are protected with government-grade security<a href="#_ftn2" name="_ftnref2"><sup><span style="font-size: small;"><sup>[2]</sup></span></sup></a>. The Base Plan includes access to <span><a href="https://www.samsungknox.com/en/solutions/it-solutions/knox-mobile-enrollment" target="_blank" rel="noopener">Knox Mobile Enrolment</a></span> (KME) and <span><a href="https://www.samsungknox.com/en/solutions/it-solutions/knox-platform-for-enterprise" target="_blank" rel="noopener">Knox Platform for Enterprise</a></span> (KPE), with no additional license key requirement for use.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Knox Suite – Essentials Plan:</strong> For those looking for more than just device setup, the Knox Suite – Essentials Plan transforms mobile devices into powerful and efficient assets. In addition to solutions found in the Base Plan, the Essentials Plan also features <span><a href="https://www.samsungknox.com/en/solutions/it-solutions/knox-manage" target="_blank" rel="noopener">Knox Manage</a></span> and <span><a href="https://docs.samsungknox.com/admin/knox-remote-support/" target="_blank" rel="noopener">Knox Remote Support</a></span> – services designed to enable unified, cross-platform device management plus real-time troubleshooting support.</li>
</ul>
<p>&nbsp;</p>
<ul>
<li><strong>Knox Suite – Enterprise Plan:</strong> As the most comprehensive Knox Suite package, the Enterprise Plan helps organisations get the most out of extensive device fleets through granular OS version control, intelligent insights and tailored features designed for the frontline. From large-scale enterprises to mid-market companies with dedicated IT support teams, this plan is best fit for those looking to fully optimise digital workspace experiences and improve productivity for frontline workers. In addition to solutions found in the Essentials Plan, the Enterprise Plan includes <span><a href="https://www.samsungknox.com/en/solutions/it-solutions/samsung_e-fota" target="_blank" rel="noopener">Knox E-FOTA</a></span>, <span><a href="https://www.samsungknox.com/en/solutions/it-solutions/knox-asset-intelligence" target="_blank" rel="noopener">Knox Asset Intelligence</a></span>, <span><a href="https://www.samsungknox.com/en/solutions/it-solutions/knox-capture" target="_blank" rel="noopener">Knox Capture</a></span>, and <span><a href="https://docs.samsungknox.com/admin/knox-authentication-manager/" target="_blank" rel="noopener">Knox Authentication Manager</a></span><span>.</span></li>
</ul>
<p>&nbsp;</p>
<p>For businesses investing in Galaxy Enterprise Edition, a comprehensive package of business-ready mobile devices and services, it now includes a one-year Knox Suite – Enterprise Plan license at no additional cost when a one-, two-, or three-year Knox Suite license is purchased, providing even greater value.</p>
<p>&nbsp;</p>
<h3><strong>Ongoing Innovation for Intelligent Device Management</strong></h3>
<p>These updates continue the evolution of Knox Suite for more intelligent device management. For businesses already using other EMM solutions, Knox Suite can be integrated seamlessly into existing operations to provide deeper insights and enhanced control over Samsung Galaxy devices, allowing IT teams to optimise device performance without disrupting existing workflows. Samsung’s ongoing collaboration with leading EMM providers also guarantees increased accessibility of Knox Suite through these partner platforms, ensuring that businesses can harness the full potential of Knox Suite’s powerful features, regardless of their current IT setup.</p>
<p>&nbsp;</p>
<p>Looking ahead, Knox Suite will continue to evolve to be even more intelligent and intuitive, empowering IT administrators with advanced tools and actionable insights while enabling businesses to unlock the full potential of their Samsung Galaxy devices to create secure, efficient mobile workspaces of the future.</p>
<p>&nbsp;</p>
<p><em><span style="font-size: small;"><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a> Offers, features, services and availability may vary by market, third-party solution and/or device.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref2" name="_ftn2"><span>[2]</span></a> Samsung Knox has successfully met the rigorous security requirements set by Governments and major enterprises around the world, providing business users with a robust mobile security solution. <span><a href="https://www.samsungknox.com/en/knox-platform/knox-certifications" target="_blank" rel="noopener">https://www.samsungknox.com/en/knox-platform/knox-certifications</a></span></span></em></p>
<p>&nbsp;</p>
]]></content:encoded>
																				</item>
					<item>
				<title>Samsung Project Infinity: The Team Protecting Your Devices</title>
				<link>https://news.samsung.com/uk/samsung-project-infinity-the-team-protecting-your-devices?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Mon, 25 Nov 2024 10:51:55 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[BLUE Team]]></category>
		<category><![CDATA[Cyber Threat Intelligence (CTI)]]></category>
		<category><![CDATA[Galaxy S24 Series]]></category>
		<category><![CDATA[Project Infinity]]></category>
		<category><![CDATA[PURPLE Team]]></category>
		<category><![CDATA[Red Team]]></category>
		<category><![CDATA[security]]></category>
                <guid isPermaLink="false">https://bit.ly/4fEji8P</guid>
									<description><![CDATA[Beginning with the Galaxy S24 series, Samsung has been offering up to seven years of mobile security updates.[1] As one of the longest periods of security]]></description>
																<content:encoded><![CDATA[<p><span data-contrast="none">Beginning with the Galaxy S24 series, Samsung has been offering </span><span data-contrast="none"><strong>up to seven years of</strong> </span><a href="https://security.samsungmobile.com/workScope.smsb" target="_blank" rel="noopener"><span data-contrast="auto">mobile security updates</span></a><span data-contrast="none">.</span><span data-contrast="none"><span style="font-size: small;"><sup>[1]</sup></span></span><span data-contrast="none"> As one of the longest periods of security support available for mobile devices, these updates help to keep customers’ smartphones secure for longer.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">This peace of mind is important when navigating our hyperconnected age as cyber threats become more common and are often undetectable until too late. The global cost of cybercrime is expected to surge in the next four years, rising from $9.22 trillion in 2024 to $13.82 trillion by 2028.</span><span data-contrast="none"><span style="font-size: small;"><sup>[2]</sup></span></span><span data-contrast="none"> Therefore, it is critical to use a device that benefits from an ecosystem of protective measures — such as security updates.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">But where do these updates come from, and why do they pop up on your phone so regularly? Deep at the heart of Samsung’s Mobile eXperience Business lies Samsung Project Infinity, a classified operation. Samsung Newsroom met the specialist units within Samsung Project Infinity who secure Galaxy devices around the clock. </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<h3><b><span data-contrast="none">Deep Diving for Unknown Dangers</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></h3>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span><img class="size-medium wp-image-19019 aligncenter" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Samsung-Project-Infinity-CTI-Taskforces-RED-BLUE-PURPLE-Teams_main1-844x563.jpg" alt="" width="844" height="563" srcset="https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Samsung-Project-Infinity-CTI-Taskforces-RED-BLUE-PURPLE-Teams_main1-844x563.jpg 844w, https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Samsung-Project-Infinity-CTI-Taskforces-RED-BLUE-PURPLE-Teams_main1-768x512.jpg 768w, https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Samsung-Project-Infinity-CTI-Taskforces-RED-BLUE-PURPLE-Teams_main1.jpg 1000w" sizes="(max-width: 844px) 100vw, 844px" /></p>
<p>&nbsp;</p>
<p><span data-contrast="none">The Cyber Threat Intelligence (CTI) taskforce is a reconnaissance unit within Samsung Project Infinity along with the Red (RED), Blue (BLUE) and Purple (PURPLE) Teams that go beyond lab conditions to identify real-world dangers. RED and BLUE perform proactive attack and defence functions, seeking out vulnerabilities and taking measures against them. PURPLE is a special operations unit that acts as both a sword and shield for specific critical areas. These teams are strategically deployed in various countries all over the world including Vietnam, Poland, Ukraine and Brazil.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: center;"><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: center;"><strong><i>They work covertly. The only time you’ll ever notice them is when you get an update containing a security patch.</i> </strong></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">CTI is dedicated to identifying potential threats and stopping hackers from taking control of your device by staying on top of the latest risks. They work to prevent malicious actions, address threats involving the trade of stolen information and ensure your smartphone or tablet stays securely under your control.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">The taskforce protects Galaxy’s internal infrastructure — safeguarding customer data and employee information such as access credentials — since any confidential information stolen by a hacker could be sold or abused for further attacks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">To identify potential threats and deploy countermeasures, CTI regularly explores the Deep Web and the Dark Web — bustling markets for security exploits, spyware, malware, ransomware, illicit tools and confidential corporate and customer information.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">Justin Choi, Vice President and Head of the Security Team, Mobile eXperience Business at Samsung Electronics, leads CTI. With over 20 years of experience in the U.S. tech industry as a cybersecurity authority and ethical hacker, Choi has collaborated globally to fortify security for major financial and tech firms. His expertise in identifying and mitigating zero-day threats drives the development of advanced security measures that protect over a billion Galaxy devices around the world.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"><img class="size-medium wp-image-19021 aligncenter" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Samsung-Project-Infinity-CTI-Taskforces-RED-BLUE-PURPLE-Teams_main2-844x563.jpg" alt="" width="844" height="563" srcset="https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Samsung-Project-Infinity-CTI-Taskforces-RED-BLUE-PURPLE-Teams_main2-844x563.jpg 844w, https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Samsung-Project-Infinity-CTI-Taskforces-RED-BLUE-PURPLE-Teams_main2-768x512.jpg 768w, https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Samsung-Project-Infinity-CTI-Taskforces-RED-BLUE-PURPLE-Teams_main2.jpg 1000w" sizes="(max-width: 844px) 100vw, 844px" /> </span></p>
<p>&nbsp;</p>
<p><span data-contrast="none">“Occasionally, we engage in security research by simulating real-world transactions,” said Choi. “We closely monitor forums and marketplaces for mentions of zero-day or N-day exploits targeting Galaxy devices, as well as any leaked intelligence that could potentially serve as an entry point for system infiltration.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">As an ethical or “white hat” hacker — whose deep understanding of hacking helps to identify and address vulnerabilities — Choi explained that any hint of suspicious behaviour within the system is swiftly traced to its origin.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">For example, requests for excessive privileges, unexpected behaviour, and network traffic with unknown servers could point to a potential breach, at which point CTI traces Indicators of Compromise to identify the threat actors and the purpose of the attacks.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">“Once we spot these kinds of threats, we collaborate with developers and operators to lock everything down for preventing attacks,” said Ranger, a CTI member. (Samsung Project Infinity staff protect their identities with aliases to avoid being personally targeted by hackers.) “We even communicate with other departments and partners on private channels to avoid taking any chances.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">CTI also studies threat actors to decipher their behavioural patterns. Understanding their motivations and objectives can help reveal their attack methods and provide insights for fortification.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">“Sometimes, an attack is financially or politically motivated,” added Tower, another CTI member. “Sometimes, they just like to show off.” </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<h3><b><span data-contrast="none">Eliminating Threats Before They Become Real</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></h3>
<p><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">While real-time threat detection is crucial, a robust offensive security policy is equally vital. RED and BLUE are inspired by military practices in which a red team simulates enemy attacks and a blue team creates defences to ensure device security in the face of ever-changing threats. In Samsung’s approach, RED simulates hacker attacks and designs new attack scenarios to identify potential vulnerabilities, whereas BLUE develops and implements patches to protect against them.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">Specialising in combating zero-day attacks, the teams address vulnerabilities before they can be exploited to prevent unauthorised access or data breaches. One notable data breach is the Pegasus incident in 2020 that left an operating system vulnerable.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">The RED taskforce initiates their project by investigating Galaxy devices. They continuously use and analyse new features in Galaxy and delve into recently disclosed vulnerabilities, while envisioning potential security threats against users. By conducting diverse research, once they select a target that presents any potential risks to actual Galaxy users, the RED taskforce begins their quest to detect 0-day vulnerabilities in the target.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">“One thing we do is fuzzing,” said Arrowhead, a RED member. “That throws all kinds of unexpected data at software to uncover any hidden flaws.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">Other methods such as code auditing as well as static and dynamic analyses help develop a comprehensive understanding of a system’s health and security. The team contextualises each threat in everyday scenarios to prevent threats to Galaxy devices.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">“It’s not so urgent if there’s a flaw with the alarm clock, but a glitch in location data could lead to somebody being unknowingly followed through their device,” added Gate, a BLUE member. “Once we discover a hypothetical weakness, we hurry to patch it and roll out an update to the relevant models.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"><img class="size-medium wp-image-19020 aligncenter" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Samsung-Project-Infinity-CTI-Taskforces-RED-BLUE-PURPLE-Teams_main3-845x563.jpg" alt="" width="845" height="563" srcset="https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Samsung-Project-Infinity-CTI-Taskforces-RED-BLUE-PURPLE-Teams_main3-845x563.jpg 845w, https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Samsung-Project-Infinity-CTI-Taskforces-RED-BLUE-PURPLE-Teams_main3-768x511.jpg 768w, https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Samsung-Project-Infinity-CTI-Taskforces-RED-BLUE-PURPLE-Teams_main3.jpg 1000w" sizes="(max-width: 845px) 100vw, 845px" /></span></p>
<h3></h3>
<h3><b><span data-contrast="none">The Specialists Among Specialists</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></h3>
<p><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">PURPLE acts as both aggressor and protector to ensure the security of critical areas, the key features of Galaxy devices. As the name suggests, PURPLE combines elements of RED and BLUE’s skillsets — however, an extra in-depth knowledge of the security measures built into the mobile devices sets this team apart.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">“Samsung collaborates with external security researchers to uncover vulnerabilities, but our own intimate knowledge of Galaxy systems allows for more effective targeting of potential weak spots,” said Sphinx, a PURPLE member.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">“The better you know a system, the better you can protect it,” added Oracle, another PURPLE member.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">Occasionally, PURPLE is called upon to address issues nobody else can including formulating new security requirements, designs and features. However, it isn’t just about keeping Galaxy devices and the Samsung Knox security platform in good shape. Samsung also advises and proposes solutions to chipset and network vendors depending on their requirements.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">Samsung’s position as a hardware leader means the company can not only scale its security innovations but also cover its secure supply chain. In this way, Galaxy is contributing to the security of next generation of chips.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">Perhaps surprisingly, the motivation behind this work sometimes has nothing to do with technology. PURPLE members perform with a sense of duty to keep people’s devices secure, and they feel a certain pride and satisfaction in finding and addressing vulnerabilities.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">  </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<h3><b><span data-contrast="none">A System of Safeguards</span></b><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></h3>
<p><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">CTI, RED, BLUE and PURPLE are critical components of Galaxy’s security strategy — but Samsung Project Infinity juggles many initiatives including the </span><a href="https://security.samsungmobile.com/rewardsProgram.smsb" target="_blank" rel="noopener"><span data-contrast="none">Samsung Mobile Security Rewards Program</span></a><a href="https://security.samsungmobile.com/rewardsProgram.smsb" target="_blank" rel="noopener"><span data-contrast="none">me</span></a><span data-contrast="none"> which works with the wider security community to further scrutinise Galaxy’s defences.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">This year, Samsung has boosted this program with a maximum reward amount of $1 million — its </span><a href="https://news.samsung.com/global/samsung-electronics-scales-up-mobile-security-rewards-program-to-boost-industry-collaboration-and-safety" target="_blank" rel="noopener"><span data-contrast="auto">highest cash incentive</span></a><span data-contrast="none"> yet for those who are able to identify the most severe attack scenarios within Galaxy devices.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">“It’s crucial to encourage participation from the security community in identifying potential vulnerabilities,” said Choi. “Especially in a world where cyberattacks are increasingly intelligent and disruptive.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">All of this goes hand in hand with Samsung’s longstanding<a href="https://news.samsung.com/global/editorial-there-is-no-privacy-without-stronger-security-thats-why-were-joining-forces-with-the-security-community-to-keep-you-safe" target="_blank" rel="noopener"> </a></span><span data-contrast="auto">model of collaboration</span><span data-contrast="none"> with hundreds of partners including carriers, service providers, chipset vendors and more. While regularly working with these partners as well as the wider community to identify threats and develop patches, Samsung Project Infinity ensures Samsung proactively takes initiative and responsibility for reinforcing its own areas of weakness.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">“Just because we have internal specialists, this doesn’t mean we don’t work with others,” added Choi. “Having more eyes gives us a better chance at spotting any vulnerabilities and helps us keep users safe.”</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">  </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none">The next time you see an update, don’t hesitate. Hit “install” and continue your online journey with peace of mind, knowing that there’s a whole team looking out for you.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="none"> </span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></p>
<p><em><span style="font-size: small;"><i><span data-contrast="none">1</span></i><i><span data-contrast="none"> Timing and availability of security maintenance releases for Samsung Galaxy devices may vary by market, network provider and/or model.</span></i><span></span></span></em><br />
<i><span data-contrast="none"></span></i></p>
<p><em><span style="font-size: small;"><i><span data-contrast="none">2</span></i><i><span data-contrast="none"> Statista Market Insight, “Cybercrime Expected To Skyrocket in Coming Years,” </span></i><a href="https://www.statista.com/chart/28878/expected-cost-of-cybercrime-until-2027/" target="_blank" rel="noopener"><i><span data-contrast="none">Chart: Cybercrime Expected To Skyrocket in Coming Years | Statista</span></i></a><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245417&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}"> </span></span></em></p>
<p><span data-ccp-props="{&quot;134245417&quot;:false}"> </span></p>
]]></content:encoded>
																				</item>
					<item>
				<title>Samsung Electronics Scales Up Mobile Security Rewards Programme To Boost Industry Collaboration and Commitment</title>
				<link>https://news.samsung.com/uk/samsung-electronics-scales-up-mobile-security-rewards-programme-to-boost-industry-collaboration-and-commitment?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Mon, 25 Nov 2024 10:45:12 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Annual Rewards Program Report]]></category>
		<category><![CDATA[Important Scenario Vulnerability Program]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Samsung Mobile Security Reward Program]]></category>
		<category><![CDATA[Samsung Mobile Security Risk Classification]]></category>
		<category><![CDATA[security]]></category>
                <guid isPermaLink="false">https://bit.ly/3V6DGY3</guid>
									<description><![CDATA[LONDON, U.K. – November 21, 2024 – Samsung Electronics Co., Ltd announced the enhancement of its Mobile Security Rewards Program, increasing the maximum reward]]></description>
																<content:encoded><![CDATA[<p><img class="alignnone size-large wp-image-19034" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Security-1024x683.jpg" alt="" width="1024" height="683" srcset="https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Security-1024x683.jpg 1024w, https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Security-845x563.jpg 845w, https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Security-768x512.jpg 768w, https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-Mobile-Security.jpg 1440w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p><strong>LONDON, U.K. – November 21, 2024 – </strong>Samsung Electronics Co., Ltd announced the enhancement of its Mobile Security Rewards Program, <strong>increasing the maximum reward amount to $1 million</strong> for eligible security vulnerability reports received from the external security community. This is part of Samsung’s ongoing efforts to foster transparency and increased collaboration in mobile security, with the criteria of the programme laid out in the <span><a href="https://security.samsungmobile.com/securityReportingRiskClassification.smsb" target="_blank" rel="noopener">Samsung Mobile Security Risk Classification </a></span>which now includes additional classification factors.</p>
<p>&nbsp;</p>
<p>Alongside this, Samsung has also published its first security-focused Annual Rewards Programme Report, showcasing the most significant highlights since the project’s launch and emphasising the crucial role of the programme’s participants. The Mobile Security Rewards Programme complements Samsung’s current offering of <strong>up to seven years of </strong><span><a href="https://security.samsungmobile.com/workScope.smsb" target="_blank" rel="noopener"><strong>security updates</strong></a></span><a href="#_ftn1" name="_ftnref1"><span><span style="font-size: small;"><sup>[1]</sup></span></span></a>, highlighting the company’s commitment to user device security.</p>
<p>&nbsp;</p>
<p>“With cybersecurity attacks becoming increasingly intelligent and more challenging to identify, we actively encourage participation from the security community in finding these threats,” said Justin Choi, Corporate VP &amp; Head of Security Team, Mobile eXperience Business at Samsung Electronics. “Their support helps us to ensure our products are continuously monitored for potential vulnerabilities, enabling us to constantly enhance the protection of our customers’ devices. It is critically important that this protection is provided and that user data and information are safeguarded, which is why we prioritise security throughout all our products and services.”</p>
<p>&nbsp;</p>
<p>Originally launched in 2017, the programme embodies Samsung’s commitment to openness and a collective approach to enhancing mobile security. By collaborating with a wide range of global experts — including cybersecurity researchers, ethical hackers and independent security professionals — the programme follows a strategic, systematic and proactive strategy to identify and address vulnerabilities, reinforcing the security of users’ mobile experiences.</p>
<p>&nbsp;</p>
<p>The maximum reward of $1 million is part of the <strong>newly introduced </strong><span><a href="https://security.samsungmobile.com/securityPostDetail.smsb/189" target="_blank" rel="noopener"><strong>Important Scenario Vulnerability Program</strong></a></span><a href="https://security.samsungmobile.com/securityPostDetail.smsb/189"><span><strong>me</strong></span></a>. This initiative focuses on the most severe attack scenarios and vulnerabilities, including arbitrary code execution on highly privileged targets; device unlock and full user data extraction; arbitrary application installations; and bypass of device protection solutions. Partnering with the security community not only reinforces Samsung&#8217;s dedication toward a transparent, collaborative framework that continuously adapts to emerging risks, but also speeds up the <span><a href="https://samsungmobilepress.com/feature-stories/samsung-project-infinity-the-team-keeping-you-safe-online" target="_blank" rel="noopener">detection and resolution</a></span> of these potential critical threats.</p>
<p>&nbsp;</p>
<h3><strong>Increased Transparency of Rewards Programme Criteria</strong></h3>
<p>&nbsp;</p>
<p><span><a href="https://security.samsungmobile.com/securityReportingRiskClassification.smsb" target="_blank" rel="noopener">Samsung Mobile Security Risk Classification</a></span> now offers a more detailed and publicly accessible system for categorising vulnerabilities, incorporating new considerations such as downgrade factors, which allow a threat’s severity level to be lowered, and an ineligible classification, for threats determined to pose minimal security concerns. The system assigns severity levels based on security risk and impact across five categories: Critical, High, Moderate, Low, and Ineligible or Less-Than-Low Security Impact. This comprehensive approach provides clear guidance for both participants and the broader security community, offering a more structured framework for vulnerability reporting. Additionally, it outlines the <span><a href="https://security.samsungmobile.com/rewardsProgram.smsb" target="_blank" rel="noopener">conditions affecting the reward qualification and amount</a></span>.</p>
<p>&nbsp;</p>
<p>The programme covers all of Samsung’s mobile devices currently receiving monthly, quarterly and biannual security updates. In addition, the programme will reward eligible submissions for potential vulnerabilities in the latest Samsung Galaxy services, including Bixby, Samsung Account and Samsung Wallet, among others.</p>
<p>&nbsp;</p>
<h3><strong>Samsung Releases Inaugural Program Report</strong></h3>
<p>&nbsp;</p>
<p>In August 2024, Samsung published its first security-focused <span><a href="https://security.samsungmobile.com/securityPostDetail.smsb/190" target="_blank" rel="noopener">Annual Rewards Programme Report</a></span>, summarising the most significant highlights since the project’s launch in 2017. Highlights include the awarding of over $800,000 to 113 researchers in 2023 alone and a total of more than $4 million in rewards paid out by Samsung to security experts around the world to date, underscoring the crucial role of the program’s participants.</p>
<p>&nbsp;</p>
<p>The Mobile Security Rewards Program is effective immediately. For additional information, including terms and conditions, please visit the <span><a href="https://security.samsungmobile.com/main.smsb" target="_blank" rel="noopener">Samsung Mobile Security</a></span> page.</p>
<p>&nbsp;</p>
<p><em><span style="font-size: small;"><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a> Timing and availability of security maintenance releases for Samsung Galaxy devices may vary by market, network provider and/or model.</span></em></p>
<p>&nbsp;</p>
]]></content:encoded>
																				</item>
					<item>
				<title>Samsung Sets New Benchmark in TV Security With FIPS 140-3 Certification</title>
				<link>https://news.samsung.com/uk/samsung-sets-new-benchmark-in-tv-security-with-fips-140-3-certification?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Fri, 15 Nov 2024 10:58:45 +0000</pubDate>
						<category><![CDATA[Press Release]]></category>
		<category><![CDATA[TVs & Displays]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Digital Display]]></category>
		<category><![CDATA[Samsung Knox]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Tizen]]></category>
                <guid isPermaLink="false">https://bit.ly/4fukzz4</guid>
									<description><![CDATA[&#160;  LONDON, U.K. – November 15, 2024 – Samsung Electronics Co., Ltd. today announced that its proprietary cryptography module, Samsung CryptoCore,[1] has]]></description>
																<content:encoded><![CDATA[<p><img class="alignnone wp-image-18984 size-medium" src="https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-TVs-and-Displays-Samsung-CryptoCore-FIPS-140-3-Certification_dl1-817x563.jpg" alt="" width="817" height="563" srcset="https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-TVs-and-Displays-Samsung-CryptoCore-FIPS-140-3-Certification_dl1-817x563.jpg 817w, https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-TVs-and-Displays-Samsung-CryptoCore-FIPS-140-3-Certification_dl1-768x530.jpg 768w, https://img.global.news.samsung.com/uk/wp-content/uploads/2024/11/Samsung-TVs-and-Displays-Samsung-CryptoCore-FIPS-140-3-Certification_dl1-1024x706.jpg 1024w" sizes="(max-width: 817px) 100vw, 817px" /></p>
<p>&nbsp;</p>
<p><strong> </strong><strong>LONDON, U.K. – November 15, 2024 –</strong> Samsung Electronics Co., Ltd. today announced that its proprietary cryptography module, Samsung CryptoCore,<a href="#_ftn1" name="_ftnref1"><span><span style="font-size: small;"><sup>[1]</sup></span></span></a> has earned the prestigious <span><a href="https://csrc.nist.gov/pubs/fips/140-3/final" target="_blank" rel="noopener">FIPS 140-3 certification</a></span><a href="#_ftn2" name="_ftnref2"><span><span style="font-size: small;"><sup>[2]</sup></span></span></a> from the National Institute of Standards and Technology (NIST). This certification underscores Samsung’s commitment to providing industry-leading security and data protection for Smart TV users.</p>
<p>&nbsp;</p>
<p>“As home entertainment systems become more connected, it becomes critical for technology companies to safeguard the personal data that enables the seamless connectivity enjoyed by so many,” said Yongjae Kim, Executive Vice President and Head of the R&amp;D Team, Visual Display Business at Samsung Electronics. “By integrating the FIPS 140-3-certified CryptoCore into our Smart TVs, Samsung is taking our commitment to secure home entertainment a step further and ensuring that our users can freely experience the value of our products.”</p>
<p>&nbsp;</p>
<p>Beginning in 2025, Samsung CryptoCore will be fully integrated into Tizen OS,<a href="#_ftn3" name="_ftnref3"><span><span style="font-size: small;"><sup>[3]</sup></span></span></a> Samsung’s Smart TV operating system, enhancing the security of key products such as TVs, monitors and digital signage. With Samsung CryptoCore embedded in Tizen OS, personal data linked to Samsung accounts will be securely encrypted, SmartThings authentication information will be protected from external hacking threats and content viewed on TVs will benefit from enhanced copyright protection.</p>
<p>&nbsp;</p>
<p>Since 2015, Samsung has equipped its Smart TVs with Samsung Knox,<a href="#_ftn4" name="_ftnref4"><span><span style="font-size: small;"><sup>[4]</sup></span></span></a> a security platform that has earned Common Criteria (CC) certification<a href="#_ftn5" name="_ftnref5"><span><span style="font-size: small;"><sup>[5]</sup></span></span></a> for 10 consecutive years. But with its newly acquired FIPS 140-3 certification, Samsung has strengthened its defences against hacking and data breaches even further, proactively protecting personal information with advanced encryption technology.</p>
<p>&nbsp;</p>
<p>Recognised by governments in 10 countries,<a href="#_ftn6" name="_ftnref6"><span><span style="font-size: small;"><sup>[6]</sup></span></span></a> the FIPS 140-3 certification requires comprehensive testing of cryptographic modules to ensure their security, integrity, and reliability. For users, this means Samsung Smart TVs offer cutting-edge protection against privacy breaches, allowing them to enjoy their content, connect smart devices, and engage with IoT services securely and without concerns.</p>
<p>&nbsp;</p>
<p><em><span style="font-size: small;"><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a> Samsung CryptoCore is a software library that encrypts and decrypts data during both transmission and storage.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref2" name="_ftn2"><span>[2]</span></a> Federal Information Processing Standard (FIPS) 140-3 covers the security requirements for cryptographic modules.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref3" name="_ftn3"><span>[3]</span></a> Tizen OS 9.0.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref4" name="_ftn4"><span>[4]</span></a> Samsung Knox provides privacy protection on its Smart TVs through features like Tizen OS Monitoring, Phishing Site Blocking, and Knox Vault. Knox Vault is available only on the QN900D and QN800D models.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref5" name="_ftn5"><span>[5]</span></a> Common Criteria (CC) certification is a global security standard recognized by 31 countries for IT product integrity.</span></em></p>
<p><em><span style="font-size: small;"><a href="#_ftnref6" name="_ftn6"><span>[6]</span></a> Recognized in the United States, Canada, UK, Germany, France, South Korea, Japan, Singapore, Australia, and New Zealand.</span></em></p>
<p>&nbsp;</p>
]]></content:encoded>
																				</item>
			</channel>
</rss>
