By using this site, you agree to our Privacy Policy and Terms of Service.
Accept
Absolute Geeks UAEAbsolute Geeks UAE
  • STORIES
    • TECH
    • AUTOMOTIVE
    • GUIDES
    • OPINIONS
  • REVIEWS
    • READERS’ CHOICE
    • ALL REVIEWS
    • ━
    • SMARTPHONES
    • CARS
    • HEADPHONES
    • ACCESSORIES
    • LAPTOPS
    • TABLETS
    • WEARABLES
    • SPEAKERS
    • APPS
  • WATCHLIST
    • TV & MOVIES REVIEWS
    • SPOTLIGHT
  • GAMING
    • GAMING NEWS
    • GAME REVIEWS
  • +
    • OUR STORY
    • GET IN TOUCH
Reading: 600m Samsung Galaxy devices reportedly exposed to hackers
Share
Notification Show More
Absolute Geeks UAEAbsolute Geeks UAE
  • STORIES
    • TECH
    • AUTOMOTIVE
    • GUIDES
    • OPINIONS
  • REVIEWS
    • READERS’ CHOICE
    • ALL REVIEWS
    • ━
    • SMARTPHONES
    • CARS
    • HEADPHONES
    • ACCESSORIES
    • LAPTOPS
    • TABLETS
    • WEARABLES
    • SPEAKERS
    • APPS
  • WATCHLIST
    • TV & MOVIES REVIEWS
    • SPOTLIGHT
  • GAMING
    • GAMING NEWS
    • GAME REVIEWS
  • +
    • OUR STORY
    • GET IN TOUCH
Follow US

600m Samsung Galaxy devices reportedly exposed to hackers

GEEK DESK
GEEK DESK
Jun 17

It appears that around 600 million Samsung Galaxy smartphones worldwide are affected by a serious vulnerability that could open a backdoor to hackers.

The security vulnerability originates from SwiftKey keyboard that comes pre-installed on a number of Samsung devices and which cannot be disabled or uninstalled.

The vulnerability that was discovered by Ryan Welton, a mobile security specialist at NowSecure, could allow an attacker to remotely execute code as a privileged (system) user, and affects models such as the Samsung Galaxy S6, S5, S4 and S4 mini.

It’s claimed that the vulnerability starts with the updates.  Like any software on a smartphone, updates are required and in this case, the keyboard updates itself by downloading a ZIP file from the internet using an unencrypted HTTP connection and makes no attempt to verify the authenticity of the archive. So theoretically, someone in control of your network could intercept the download, and send the phone a malicious file instead and take control of the device.

[quote type=”border_left”]… the keyboard was signed with Samsung’s private signing key and runs in one of the most privileged contexts on the device, system user, said NowSecure said in a blog post. The vulnerability is triggered automatically (no human interaction) on reboot as well as randomly when the application decides to update [its language packs]. [/quote]

According to NowSecure, Samsung was informed about the vulnerability in November 2014 and reportedly gave a patch to mobile operators earlier this year; however, it is unclear if carriers have passed the fix to all users.

Samsung owners are advised  to avoid unsecured Wi-Fi networks until the company confirms the fix.

Share
What do you think?
Happy0
Sad0
Love0
Surprise0
Cry0
Angry0
Dead0

WHAT'S HOT ❰

HONOR Magic8 Pro Professional Imaging Kit enhances mobile photography
iPhones just hitched a ride to the moon on Artemis II
This $9,600 iPhone comes with a piece of Steve Jobs’ turtleneck
Google’s Gemini Nano 4 aims to make on-device AI faster and less draining
Google Meet arrives on Apple CarPlay with audio-only limitations
Absolute Geeks UAEAbsolute Geeks UAE
Follow US
AbsoluteGeeks.com was assembled by Absolute Geeks Media FZE LLC during a caffeine incident.
© 2014–2026. All rights reserved.
Proudly made in Dubai, UAE ❤️
Upgrade Your Brain Firmware
Receive updates, patches, and jokes you’ll pretend you understood.
No spam, just RAM for your brain.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?