Samsung: Samsung introduces Message Guard for Galaxy smartphones – Times of India
Samsung has launched a security feature called Message Guard to protect users against “zero-click” cyberattacks that can install harmful code on devices through image attachments in messages without any user action. This feature aims to provide improved security against such threats.
Samsung’s new Message Guard feature can preemptively stop zero-click attacks by automatically identifying and neutralising potential threats hidden within image files in formats such as PNG, JPG/JPEG, GIF, ICO, WEBP, BMP, and WBMP.
Citizen Lab made a significant discovery in 2020 when they found that NSO’s Pegasus spyware had been installed on the phones of journalists, politicians, and activists between 2017 and 2020, using a well-known iOS/iMessage zero-click security vulnerability. This is one of the most remarkable instances of zero-click attacks.
Victims of zero-click attacks may remain completely oblivious to the fact that their device has been compromised, as these attacks typically do not leave any noticeable evidence. Furthermore, in some instances, security measures like end-to-end encrypted messaging, which are designed to safeguard users, can make it more difficult to detect zero-click attacks since the transmitted data is visible solely to the sender and receiver.
Whenever a Galaxy device receives a text message with an image attachment, Message Guard will separate the image file from the rest of the device to prevent any harmful code. Subsequently, the feature scans the image and verifies it to ensure it is safe to process and cannot infect the device.
The newly released Samsung Galaxy S23 series now offers the Samsung Message Guard, which is also slated for a gradual rollout to other Galaxy smartphones and tablets that run on One UI 5.1 sometime later this year. Samsung Message Guard is compatible with Samsung Messages and Messages by Google, but will eventually extend to other unnamed third-party messaging apps through a software update in the future.
Samsung’s new Message Guard feature can preemptively stop zero-click attacks by automatically identifying and neutralising potential threats hidden within image files in formats such as PNG, JPG/JPEG, GIF, ICO, WEBP, BMP, and WBMP.
Citizen Lab made a significant discovery in 2020 when they found that NSO’s Pegasus spyware had been installed on the phones of journalists, politicians, and activists between 2017 and 2020, using a well-known iOS/iMessage zero-click security vulnerability. This is one of the most remarkable instances of zero-click attacks.
Victims of zero-click attacks may remain completely oblivious to the fact that their device has been compromised, as these attacks typically do not leave any noticeable evidence. Furthermore, in some instances, security measures like end-to-end encrypted messaging, which are designed to safeguard users, can make it more difficult to detect zero-click attacks since the transmitted data is visible solely to the sender and receiver.
Whenever a Galaxy device receives a text message with an image attachment, Message Guard will separate the image file from the rest of the device to prevent any harmful code. Subsequently, the feature scans the image and verifies it to ensure it is safe to process and cannot infect the device.
The newly released Samsung Galaxy S23 series now offers the Samsung Message Guard, which is also slated for a gradual rollout to other Galaxy smartphones and tablets that run on One UI 5.1 sometime later this year. Samsung Message Guard is compatible with Samsung Messages and Messages by Google, but will eventually extend to other unnamed third-party messaging apps through a software update in the future.
For all the latest Technology News Click Here
For the latest news and updates, follow us on Google News.
Denial of responsibility! TechNewsBoy.com is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.