Monday, December 7, 2015

Samsung Electronics

The technology giant Samsung Electronics today replaced the head of its mobile phone business in a time marked by the decline of their smartphones over the last two years that has cut the benefits of the company.

Koh Dong-jin, so far responsible for research and development in mobile telephony, has been promoted to director of the Department of mobile communication of the firm, said the Samsung Group in a statement.

Occupied this post until now Shin Jong-kyun, who continue to maintain the top position of executive director of the Division of computing and mobile communications, which includes this department specialized in smartphones, tablets, and similar devices.

The new director of the Department was one of the main protagonists in the development of new products star from Samsung, the Galaxy Note 5 phablet and especially the smartphone Galaxy S6 which brought important design innovations and other features compared to its predecessor, the discreet S5.

Business smartphones and smart devices from Samsung contributed almost half of the company's profits, but since it went on sale the S5 at the beginning of 2014 the business has fallen progressively to the point that semiconductors have become their main source of income.

This has happened to the Apple iPhone has left behind its rivals in the high-end and phones of Chinese manufacturers - mainly Xiaomi and Huawei - have won ground segments in low and medium.

"It has vision and knowledge"
On the other hand, the Samsung Group said that the new head of the Department of mobile communications "possesses vision and knowledge on development of solutions and services such as KNOX and Samsung Pay, which is expected to cast the second jump of the mobile business," according to the statement.

Samsung increased its sales of mobile phones a 18% up to 105 million units, of which 80% - some 84 million units - correspond to smart devices in the third quarter.

Despite this increase, mainly attributed to an aggressive lowering of prices, the computing and Mobile Communications Division saw falling profits more than 10% from the previous quarter.

When we talk by phone, reveal a lot of information about our lives: what we are doing at that moment, where we are and where we will go, what are our tastes or hobbies, or even details about our work that are likely to be confidential. Talk to our Bank by phone, we can reveal our name, our birth date and even the recent movements of our own.

Jealous as we are of our privacy, when we have a conversation about a delicate subject, we close the door of the room or susurramos in a voice low to avoid cotillas potentials that surround us are aware of our intimacies. However, these security measures may serve little if you have a Samsung Galaxy between hands.

This two experts in computer security, Daniel Komaromy and Nico Golde, at the recent Conference Mobile Pwn2Own in Tokyo, have demonstrated since they have

The duo of researchers took advantage to this chip baseband of these devices, which is in charge of all communications by radio. To get access, they carried out a 'man in the middle' attack. This classic technique allows a Web of criminal to be capable of reading and intercept messages of their victims while they realize.

In his case, they were able to intercept voice calls by connecting these devices with a fake season, making believe to close smartphones that it was a legitimate telephone Tower.

Once connected, these security experts could communicate remotely with band processor base without the user's knowledge. From that moment they had go-ahead to intercept, listen and even record phone calls. These researchers achieved with this simple method to spy on those devices.

Now, that mean that any ciberatacante could easily take control of my Galaxy and listen the confidences that I share with my friends? Komaromy and Golde have highlighted that the system presented is just one example: the idea would later redirect calls to a proxy to make the real attack after getting the call to its real recipient.

In addition, these experts have not reported the details of his experiment and reported his discovery to Samsung, in such a way that the company can soon resolve this vulnerability so that the conversations of customers end up in the hands of third parties.


Unfortunately, this is only one of multiple methods that you can use a ciberatacante to commit their misdeeds. As you already have a few months ago, some Cybercriminals have already developed programs spyware to activate our microphone remotely.

Even a group of researchers from Stanford University development Gyrophone, an application that used the gyroscope to capture the vibrations of sound of the human voice and spy on calls in this way.

Although we won't tell you to let speak by mobile phone, it should be recalled that it is not convenient to transmit the keys to your bank account or those of your computer or smartphone on a call.

This advice is especially important if your profession requires a high degree of confidentiality. Worry because your device is as safe as possible to prevent possible attacks is another of the warnings that you should keep in mind. You never know if a ciberatacante is going to be interested in listening to your conversations.