• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 18th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security

Samsung’ Tizen OS Contains Tons of Critical Security Flaws

April 5th, 2017 Jahanzaib Hassan Security 0 comments
Samsung’ Tizen OS Contains Tons of Critical Security Flaws
Share on FacebookShare on Twitter

Samsung Electronics has remained in the news lately for all the wrong reasons. Now there is another not-so-great achievement by the company that is related to its Tizen operating system. According to the findings of an Israeli IT security researcher Amihai Neiderman, this OS contains not one or two but around 40 Critical security flaws. That’s what we may call it a highly vulnerable operating system because a single flaw in the software leads to devastating damages, therefore when there are 40 flaws you need to disregard the coding and write it afresh entirely.

Samsung uses Tizen OS in its mobile phones, smart TVs, and smartwatches. Samsung states that Tizen is an open-source OS. According to the company’s November 2016 statistics, the OS was used in 50 million devices including Samsung Gear S3 smartwatch and their Smart TVs. This means, if the analysis of Neiderman is accurate then the extent of impending security threat is also quite extensive in scope.

More: Here’s What a Samsung Galaxy S7 Hacked with Ransomware Looks Like

Neiderman has documented all the information in a detailed report and presented it at Kaspersky’s Security Analyst Summit, which was held at St. Marteen on Monday. Neiderman claims that he did contact Samsung regarding flaws in its Tizen OS a few months back but all he received was an automated response email. On the other hand, Samsung claimed that they are now collaborating with Neiderman for mitigating the “potential vulnerabilities.”

An official spokesperson of Samsung Mashable that “Samsung Electronics takes security and privacy very seriously. We regularly check our systems, and if at any time there is a credible potential vulnerability, we act promptly to investigate and resolve the issue. We continually provide software updates to consumers to safeguard their products. We are fully committed to cooperating with Mr. Neiderman to mitigate any potential vulnerabilities.”

The Israeli researcher has claimed that all of the 40 flaws are of critical nature because they allow an attacker to gain control of any Samsung device remotely. However, the threat level also varies with every flaw, and some are highly critical. One of the identified flaws allows the attacker to control an app uploaded on Tizen OS app store called the TizenStore app. After controlling, the attacker can easily inject malicious code or malware into a Tizen device, reports MotherBoard.

More: Hacker Shows How Smart TVs Can Be Remotely Hacked

Neiderman stated that after he purchased a Samsung Smart TV in 2016, he was curious to analyze the system’s reliability regarding software security. After the research was complete, he came to the conclusion that Tizen OS has the worst code among them all. He believes that nobody in their right mind would write code like this, which is full of security holes.

“Everything you can do wrong there, they do it. You can see that nobody with any understanding of security looked at this code or wrote it. It’s like taking an undergraduate and letting him program your software.”

[newad][/newad]


DDoS attacks are increasing, calculate the cost and probability of a DDoS attack on your business with this DDoS Downtime Cost Calculator.

  • Tags
  • hacking
  • internet
  • IoT
  • Privacy
  • Samsung
  • security
  • Smartphone
  • Vulnerability
Facebook Twitter LinkedIn Pinterest
Previous article Hackers can take over Smart Dildos and stream videos online
Next article North Korean Hackers Targeting Banks Globally: Report
Jahanzaib Hassan

Jahanzaib Hassan

Related Posts
Top Tips to Upscale Your Netflix Security Instantly

Top Tips to Upscale Your Netflix Security Instantly

'Child's Play' - Kids breach and bypass Linux Mint screensaver lock

'Child's Play' - Kids breach and bypass Linux Mint screensaver lock

Warning as hackers breach MFA to target cloud services

Warning as hackers breach MFA to target cloud services

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Top Tips to Upscale Your Netflix Security Instantly
Security

Top Tips to Upscale Your Netflix Security Instantly

264
'Child's Play' - Kids breach and bypass Linux Mint screensaver lock
Security

'Child's Play' - Kids breach and bypass Linux Mint screensaver lock

992
Transferring data between smartphones seamlessly
Technology News

Transferring data between smartphones seamlessly

698

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us