How to make your phone effectively untraceable

How to make your phone effectively untraceable

The radios within a smartphone that facilitate tracking can’t be turned off with certainty, even when the device is powered down. To close this gap, we’ve partnered with Samsung on a unique ...
A phone home screen shows Signal and Telegram app icons

BadBazaar: Chinese Spyware Shams Signal, Telegram Apps

After sneaking into Google and Samsung app stores, “GREF” APT targets Uyghurs and other PRC minorities ...
Security Boulevard
How the “two-man rule” elevates mobile security

How the “two-man rule” elevates mobile security

You may be familiar with the “two-man rule” from the movies. Used as a control mechanism for critical actions like launching a nuclear weapon, the two-man rule requires two authorized individuals to ...
Privoro-Samsung partnership provides trusted control over smartphone radios and sensors

Privoro-Samsung partnership provides trusted control over smartphone radios and sensors

We’re excited to share that Privoro and Samsung have partnered to provide a powerful new security capability: high-assurance control over the radios, sensors and other hardware peripherals within Samsung’s flagship mobile devices ...
Why are Phone Numbers Used for Identification? Hacker Summer Camp Advice, Samsung Repair Mode

Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode

Why your phone number is becoming a popular way to identify you, our advise on how to best protect your privacy at hacker summer camp in Las Vegas (BSides, BlackHat, DEF CON), ...
Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month ...
The Original APT: Advanced Persistent Teenagers

The Original APT: Advanced Persistent Teenagers

Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection ...
Amazon Echos Hack Themselves, Fraud Is Flourishing on Zelle, Samsung Galaxy Source Code Stolen

Amazon Echos Hack Themselves, Fraud Is Flourishing on Zelle, Samsung Galaxy Source Code Stolen

A new attack uses Alexa’s functionality to force Amazon Echo devices to make self-issued commands, payment app Zelle has become popular with fraudsters and banks don’t seem to care, and details about ...
Lapsus$ Strikes Again—190GB Samsung Data Release by Nvidia Hackers

Lapsus$ Strikes Again—190GB Samsung Data Release by Nvidia Hackers

Samsung Electronics has confidential data stolen and leaked by ransomware scrotes—190 GB of it ...
Security Boulevard

Samsung Encryption Flaw

Researchers have found a major encryption flaw in 100 million Samsung Galaxy phones. From the abstract: In this work, we expose the cryptographic design and implementation of Android’s Hardware-Backed Keystore in Samsung’s ...