Cadastre-se agora para um orçamento mais personalizado!

Hackers gained access to Samsung customer data

02 de setembro de 2022 Hi-network.com
Image: Corinne Reichert/

Hackers gained access to Samsung's US systems and stole customer information, the mobile phone giant said Friday. The cybersecurity breach took place in late July, and by August 4, Samsung discovered that customer information was taken. 

The hackers didn't gain access to Social Security numbers, or credit card or debit card numbers, Samsung said. The affected information included names, contact and demographic information, date of birth, and product registration information. Samsung also noted that consumer devices were not affected in this incident, and customers can continue to use Samsung products and services as usual.

Samsung Unpacked

  • Samsung Galaxy Z Flip 5 review: Three features I love (and two that I still wish for)
  • Samsung Galaxy Tab S9 Ultra hands-on review: Minor improvements to an already great tablet
  • How to preorder the Samsung Galaxy Z Fold 5, Flip 5, Tab S6 and more
  • Samsung Galaxy Z Fold 5 hands-on review: Three upgrades that make a notable difference
  • We tested every foldable phone on the market. These are the best models

Samsung did not immediately respond to questions regarding how many customers were affected. 

SEE: These are the cybersecurity threats of tomorrow that you should be thinking about today

"We have taken actions to secure the affected systems, and have engaged a leading outside cybersecurity firm and are coordinating with law enforcement," the company said in a brief notification posted online. 

Samsung also said it has communicated directly with affected customers about the matter. Should the company discover any other impacted customers, it will notify them accordingly. 

Earlier in the year, the South American hacking group Lapsus$gained access to the source code of Galaxy devices, but no personal customer information was compromised in that incident.

Security

8 habits of highly secure remote workersHow to find and remove spyware from your phoneThe best VPN services: How do the top 5 compare?How to find out if you are involved in a data breach -- and what to do next
  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next

tag-icon Tags quentes : Tecnologia Segurança

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.