• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
samsung introduces new feature to protect users from zero click malware

Samsung Introduces New Feature to Protect Users from Zero-Click Malware Attacks

You are here: Home / General Cyber Security News / Samsung Introduces New Feature to Protect Users from Zero-Click Malware Attacks
February 20, 2023

Samsung has announced a new attribute named Concept Guard that arrives with safeguards to shield buyers from malware and adware through what is referred to as zero-click attacks.

The South Korean chaebol said the alternative “preemptively” secures users’ equipment by “limiting publicity to invisible threats disguised as impression attachments.”

The security function, obtainable on Samsung Messages and Google Messages, is at this time restricted to the Samsung Galaxy S23 series, with plans to grow it to other Galaxy smartphones and tablets later this calendar year that are working on Just one UI 5.1 or greater.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Zero-click attacks are very-focused and innovative attacks that exploit previously not known flaws (i.e., zero-days) in computer software to result in execution of destructive code without necessitating any consumer interaction.

Unlike classic strategies of remotely exploiting a product whereby danger actors count on phishing strategies to trick a person into clicking on a destructive connection or opening an rogue file, such attacks circumvent the require for social engineering solely and deliver an adversary with an entry issue.

A the vast majority of the zero-click on exploits are engineered to acquire gain of vulnerabilities in applications these types of as messaging, SMS, or email apps that obtain and system untrusted information.

As a consequence, if there exists a security vulnerability in the manner an app interprets the incoming information, a danger actor could weaponize this shortcoming to craft a malicious image that, when sent to a target’s product, automatically executes the code embedded in it.

The lack of conversation concerned in zero-click attacks means there are much less traces of any nefarious activity, creating them hugely-prized tools to deliver spy ware able of checking people and harvesting a prosperity of sensitive data.

Zero-Click Malware Attacks

Samsung’s Concept Guard functions against a range of image formats, which include PNG, JPG/JPEG, GIF, ICO, WEBP, BMP, and WBMP, and essentially acts as a sandbox which is created to quarantine photos acquired via the application from the relaxation of the working procedure.

“Information Guard checks the file little bit by bit and processes it in a managed ecosystem to make sure it cannot infect the relaxation of your machine,” the company claimed.

The function is also analogous to a characteristic in Apple’s iMessage known as BlastDoor that the tech huge incorporated in iOS 14 as a indicates to counter zero-simply click attacks by means of its messaging app.

Apple, final year, also released an “extraordinary, optional safety” setting dubbed Lockdown Manner that hardens iPhones and iPads from “very exceptional and highly sophisticated cyber attacks.”

Observed this post interesting? Comply with us on Twitter  and LinkedIn to read through much more unique articles we put up.


Some pieces of this article are sourced from:
thehackernews.com

Previous Post: «fortinet issues patches for 40 flaws affecting fortiweb, fortios, fortios, Fortinet Issues Patches for 40 Flaws Affecting FortiWeb, FortiOS, FortiOS, and FortiProxy
Next Post: The Guide to Choosing a Cyber Risk Quantification Strategywww.cyesec.comCybersecurity Guide DownloadHow to understand the true cost of cyber incidents and remediation and optimize security budgets. the guide to choosing a cyber risk quantification strategywww.cyesec.comcybersecurity guide»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Copyright © TheCyberSecurity.News, All Rights Reserved.