• 中文版
  • BM
  • News
  • Deals
  • Reviews
    • First Impressions
    • Hands-on
    • Comparisons
  • Tech
    • Mobile
    • Computers
    • Cameras
    • Wearables
    • Audio
    • Drones
  • Telco
    • Celcom
    • Digi
    • Maxis
    • Time
    • Tune Talk
    • U Mobile
    • Unifi
    • Yes
  • Cars
  • Contribute
  • Jobs
Menu
  • 中文版
  • BM
  • News
  • Deals
  • Reviews
    • First Impressions
    • Hands-on
    • Comparisons
  • Tech
    • Mobile
    • Computers
    • Cameras
    • Wearables
    • Audio
    • Drones
  • Telco
    • Celcom
    • Digi
    • Maxis
    • Time
    • Tune Talk
    • U Mobile
    • Unifi
    • Yes
  • Cars
  • Contribute
  • Jobs
Search
  • Tech
    • News
    • Mobile
    • Computers
    • Cameras
    • Wearables
    • Audio
    • Drones
  • Telco
    • Celcom
    • Digi
    • Maxis
    • Time
    • U Mobile
    • Unifi
    • Yes
  • Reviews
    • First Impressions
    • Hands-on
    • Comparisons
  • Buyer’s Guide
  • Opinions
  • Digital Life
  • Video
  • Deals
  • How-To
  • Cars
  • Bahasa Melayu
  • EV
  • Contribute
  • Advertise
Menu
  • Tech
    • News
    • Mobile
    • Computers
    • Cameras
    • Wearables
    • Audio
    • Drones
  • Telco
    • Celcom
    • Digi
    • Maxis
    • Time
    • U Mobile
    • Unifi
    • Yes
  • Reviews
    • First Impressions
    • Hands-on
    • Comparisons
  • Buyer’s Guide
  • Opinions
  • Digital Life
  • Video
  • Deals
  • How-To
  • Cars
  • Bahasa Melayu
  • EV
  • Contribute
  • Advertise
Search
Close
Home News

Samsung to fix its native keyboard vulnerability issue with KNOX

  • BY Sirap Bandung
  • 18 June 2015
  • 6:21 pm
  • Comment
Share on FacebookShare on Twitter

150617-galaxy-keyboard

UPDATE: To ensure you get the security policy update, follow the steps after the break.

Yesterday we reported that Samsung’s pre-installed keyboard had an exploit that could completely compromise your phone. Samsung has now announced that it is taking care of the problem using their own KNOX security feature. While the keyboard looks nothing like SwiftKey, its the SDK that Samsung uses for their word predictive feature that makes it vulnerable.

To recap, the exploit makes it possible for people with malicious intent to modify or install apps without your knowledge, grab GPS coordinates and access your camera, microphone, messages and locally stored files and Samsung believes that over 600 million phones are likely to be at risk.

Samsung KNOX is essentially a secure sandbox that they can use as a conduit of the fix and Samsung can bypass the need to send a firmware update out to the carriers to test it before it goes out to rectify the exploit faster. The new security policy updates will be rolling out in a few days so Samsung users can rest easy.

To doubly make sure you get your update for the fix, follow the steps below.

1. Enter your main settings menu and open the “Security” section.

2. Scroll down to “Other security settings” and elect “Security policy updates”

3. Check “Automatic Updates”

[VIA, 1][SOURCE]

Tags: KeyboardKNOXmobile deviceSamsungsamsung exploitSamsung Galaxy S4Samsung Galaxy S5Samsung Galaxy S6samsung swiftkeySwiftKey
Sirap Bandung

Sirap Bandung

[email protected]

POPULAR

Tune Talk introduces #TheRealTuney campaign, highlights focus on all-day Ultra Fast 5G Connectivity for 2026

January 23, 2026

Samsung to fix its native keyboard vulnerability issue with KNOX

June 18, 2015

Is your TNG eWallet suspended? Here’s what you should do

January 27, 2026
2026 Proton S70 MC with i-GT 1.5TD engine

2026 Proton S70 MC is here: Features i-GT engine, Apple CarPlay support, priced from RM69k

February 12, 2026

Astro drops HBO channels after nearly 30 years, introduces 4 new channels under Astro One Epic Pack

February 16, 2026

Samsung Galaxy S26 launching on 26 Feb, full specs leaked: Another year of playing it safe?

February 12, 2026

Copyright © 2025 · SoyaCincau.com
Mind Blow Sdn Bhd (1076827-P)

  • ADVERTISE
  • DISCLAIMER

Copyright © 2026 · SoyaCincau.com – Mind Blow Sdn Bhd (1076827-P)

  • ADVERTISE
  • DISCLAIMER