waliabroagain
Active Level 2
Options
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-17-2022 01:51 PM in
Galaxy S
In light of major spyware news from the likes of RCMP and the infamous Pegasus from NSO, where the hackers were able to see even encrypted messages from the Signal app, I have some questions concerning the security of Samsung devices.
What if these spyware tools were somehow able to disguise itself as a system process - or reconfigure integrity checks to ignore the spyware altogether? What reassurances can Samsung provide to us proving that this is not possible - or that, if it is possible, then how do we identify and correct it?
Additionally, how to ensure that the display/screen output signal is secure and not compromised? Can any other system processes access it outside of the OS? Can an app hijack the accessibility permissions of another app (like a password manager)? How to check which apps have recorded the screen, screenshotted it, or have the permissions to do so - and if they do, then how to prevent it?
Thank you.
10 REPLIES 10
- « Previous
-
- 1
- 2
- Next »
Theblueberry
Active Level 6
Options
- Mark as New
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-19-2022 09:16 AM in
Galaxy S
I have, yes. And they may not require user interaction like the other spyware, malware, and other exploits. But they are also not an easy thing to build, so that type of attack isn't something the average person has to worry about. High profile targets are worth the effort put into building the exploit itself.
The average person isn't.
So far zero click attacks have had to find an exploit in apps with a large user base which isn't easy, since apps with lots of users tend to have active security development teams to find and patch these exploits first.
So the only people affected by these zero click attacks are the ones who didn't update their apps in the small window between the exploit being released and the Devs catching and patching it.
Update your apps when there is security patches and you'll be fine.
The average person isn't.
So far zero click attacks have had to find an exploit in apps with a large user base which isn't easy, since apps with lots of users tend to have active security development teams to find and patch these exploits first.
So the only people affected by these zero click attacks are the ones who didn't update their apps in the small window between the exploit being released and the Devs catching and patching it.
Update your apps when there is security patches and you'll be fine.

- « Previous
-
- 1
- 2
- Next »