What You Need to Know About the Recent Samsung Design Flaws
September 1, 2015 No CommentsFeatured article by Calvin Page, IT Specialist
It’s been an interesting summer for Samsung smartphone owners. Following the release of the critically lauded Galaxy S6 in April, the phone manufacturer has experienced a wave of security and design flaws that have left many users reeling. These flaws are just one detail in a larger narrative concerning the security of our personal data. SInce the compromise of nearly 40 million Target credit card numbers in 2013 to the recent Ashley Madison hack, digital security has become a regularly trending topic. In Samsung’s case, the flashy headlines surrounding their most recent security flaws didn’t necessarily capture the nuances of each incident. But as smartphone consumers, it’s important to know these details, since they can often serve as a first line of defense against future flaws and vulnerabilities. Here are three important things you need to know about Samsung’s recent security and design flaws.
Most Flaws Are Software-Based…
In mid-June, a flaw in the Swiftkey keyboard software left an estimated 600 million users vulnerable to data theft, malware installation and call eavesdropping, CNET reported. The flaw affected a range of devices from the Galaxy S4 Mini all the way up to the recently released S6. Swiftkey isn’t an application in the usual sense; rather, it’s a proprietary piece of software that needs to be running for the phone to function properly. Because it used an unsecure connection, Swiftkey left the phone vulnerable to hacker infiltration when it tried to update its software. Think of it like leaving your front door open while you carry groceries in from the car. Since Swiftkey is so deeply woven into Samsung’s software, it was impossible for users to uninstall it and effectively kill the vulnerability. However, Samsung was quick to release a security update and a statement promising to work with Swiftkey’s developer to avoid any future issues.
The Swiftkey vulnerability was specific to Samsung phones, but it isn’t the only one to affect Samsung user’s this summer. In July, a serious flaw was found in the Android operating system that allowed hackers to embed malicious code in a video file, which could then be sent as a text message. Users didn’t even need to click on the video for the malware to take effect. As the BBC reported, Android users had to wait several weeks for a patch but by July 7 because the open-source nature of the operating system made it difficult to update across a wide variety of devices. By early August, the flaw was fixed in was Google called one of it’s biggest security updates ever.
… But Not All Flaws Are
Earlier this week, Android Police reported a design flaw in the Galaxy Note 5 that has nothing to do with data security but could still do plenty of damage. The Note 5 features the S Pen, a stylus that gives phone a more “paper-like” quality. The flaw was found in the S-Pen’s storage slot, which resides on the lower right hand section of the phone. Previous generations of the phone were specifically designed so that the pen could only be inserted one way. If you tried to insert it upside down, you’d find that it didn’t fit unless you used substantial force.
However, the Note 5 doesn’t have the same failsafe. You can very easily (and mistakenly) insert the S-Pen into the slot upside down. Insert it far enough without realizing what you’ve done, and the pen will become stuck. Try to pull it back out and you risk the possibility of damaging the sensor that detects if the S-Pen is attached or not. There is no real “fix” for this issue, beyond being careful about how you insert the S-Pen into the slot. The user’s manual specifically notes that improperly inserting the stylus may cause damage.