Author: alienbd

  • Samsung Expands Availability of Latest Wearable Experiences to More Users

    Samsung Expands Availability of Latest Wearable Experiences to More Users

    One UI 6 Watch will soon be available to a wider range of Galaxy Watch devices through the latest software update.1 Beginning to roll out today, the update will bring select features from the Galaxy Watch Ultra and Galaxy Watch72 to previous generations of Galaxy Watch around the world including Galaxy Watch6, Galaxy Watch6 Classic, Galaxy Watch5, Galaxy Watch5 Pro, Galaxy Watch4, Galaxy Watch4 Classic and Galaxy Watch FE.

    The One UI 6 Watch update offers personalized insights to even more users for a holistic and comprehensive understanding of health.3 With Energy Score, users can better understand their physical and mental conditions through an intuitive score calculated from various health metrics including sleep, activity, sleeping heart rate and sleeping heart rate variability. Users can also access personalized recommendations, powered by Galaxy AI,4 to support health improvement. For sleep tracking, receive a deeper and more accurate understanding of sleep with a detailed analysis powered by an advanced AI algorithm and new sleep metrics, including movement during sleep, sleep latency, heart rate and respiratory rate. Additionally, the De Novo FDA-authorized Sleep Apnea feature is now available on a wider range of Galaxy Watch devices, helping more users proactively spot potential signs of moderate to severe sleep apnea.

    The expansion of One UI 6 Watch empowers more users to stay motivated and conquer their fitness goals with personalized experiences. Monitor progress in real time when running or cycling with Race, which compares changes in current and past performance to encourage users to make improvements. Workout Routine allows users to combine various exercises and create personalized routines, uniquely tailored to their individual goals and preferences.

    Furthermore, the latest update provides new watch faces to best suit various needs or preferences that are both stylish and functional. For instance, use the Simple Digital watch face to reflect a minimalist design, or the Ultra Info Board watch face to check information at a glance without sacrificing style. The expansion of One UI 6 Watch also allows users to enjoy more seamless experiences with connected Galaxy devices. When paired with a compatible Galaxy smartphone, users can effortlessly send suitable responses with AI-powered Suggested replies. With simple and intuitive Double Pinch Gestures, a connected Galaxy smartphone can be easily controlled right from the wrist to answer calls, dismiss alarms, take photos and even more.

    1 The software update will come first to the Galaxy Watch6 series and then become available sequentially to previous generations. Feature availability and support may vary by market, carrier, model and paired smartphone.
    2 For more information on relevant product features and disclaimers, please click the hyperlink.
    3 Intended for general wellness and fitness purposes only. Not intended for use in the detection, diagnosis, treatment, monitoring or management of any medical condition or disease. Any health-related information accessed through the device and/or application should not be treated as medical advice. Users should seek any medical advice from a physician. Certain features may vary by market, carrier or paired device.
    4 Samsung does not make any promises, assurances or guarantees as to the accuracy, completeness or reliability of the output provided by AI features. Samsung account login may be required to use certain Samsung AI features. Galaxy AI service may be limited for minors in certain regions with age restrictions over AI usage. Galaxy AI features will be provided for free until the end of 2025 on supported Samsung Galaxy devices. Different terms may apply for AI features provided by third parties.

  • Samsung One UI 7 Beta Starts To Roll Out Showcasing the Glimpse of Future of Mobile AI

    Samsung One UI 7 Beta Starts To Roll Out Showcasing the Glimpse of Future of Mobile AI

    Samsung Electronics today announced the public release of the One UI 7 beta program, boasting powerful AI features, simplified controls and a preview of scalable AI ecosystems of the future. One UI 7 marks a significant leap forward by integrating leading AI agents and multimodal capabilities into every touch point of the interface, creating an AI platform where every interaction feels natural and intuitive. The beta program offers a first look at an upgraded mobile user experience for greater personalization than ever before.

    One UI 7 brings powerful updates to Galaxy AI features1 including advanced writing assist tools. Integrated into AI OS, they allow users to boost their productivity where texts can be selected, without needing to switch between applications. This capability expands on the powerful writing assist tools already available to Galaxy users, offering AI-powered options to summarize content, check spelling and grammar, and automatically format notes into bullet points.

    Upgraded call features with One UI 7 push the boundaries of communication and connection through call transcripts, with support for 20 languages.2 When call recording is enabled, recorded calls will automatically be transcribed for reference later on, eliminating the need to take notes manually while multi-tasking.

    Bold New Design for Greater Personalization and Control  

    One UI 7’s powerful AI features come with a significant new look, based on a new notification system that streamlines communication with easy access from the device’s lock screen. It includes Now Bar, which highlights relevant activities across various features like Interpreter, Music, Recording, Stopwatch and more. By offering instant access to important notifications, Now Bar reduces the need to constantly unlock the device and allows users to engage with key information effortlessly. Set to be supported on upcoming Galaxy S series devices, Now Bar will transform the lock screen experience, which will continue to evolve with more intelligent experiences in the future.

    These feature upgrades are all anchored in a simple, impactful and emotive design. Together, these principles shape streamlined and cohesive experiences for Galaxy users. Defined by bold, iconic design choices, One UI 7 reduces visual clutter and fosters an inviting experience designed to resonate with users on a personal level and enable intuitive mobile experiences across AI features.

    A simplified home screen, redesigned One UI widgets and lock screen — among other features — work together to grant users granular control over every detail and make customization intuitive and seamless.

    A redesigned camera UX allows more intuitive control over advanced settings. Camera buttons, controls and modes have been reorganized to make it easier to find the features you need and to give you a clearer preview of the picture you’re taking or the video you’re recording.

    For Pro and Pro video modes, the manual settings layout has also been simplified, making it easier to focus on the picture or video you’re shooting. A new zoom control is available when you’re recording in Pro video mode, allowing you to control the zoom speed for smooth transitions.

    The official One UI 7 release will commence with upcoming Galaxy S series devices, featuring additional AI capabilities including enhanced on-device AI functions, starting from the first quarter of 2025. In line with Samsung’s commitment to extend its OS upgrade policy, the update will gradually roll out to other Galaxy devices.

    The One UI 7 beta program will be first available for Galaxy S24 series devices in Germany, India, Korea, Poland, the U.K. and the U.S., from December 5. Galaxy S24 series users can apply to join the beta program via Samsung Members.

  • Samsung Showcases Enhanced Portfolio at RSNA 2024

    Samsung Showcases Enhanced Portfolio at RSNA 2024

    Floor-mounted digital X-ray GF 85 and pediatric cardiac-specific ultrasound probe unveiled for the first time

    To strengthen its competitiveness across medical specialties, after the launch of a new OB & GYN ultrasound diagnostic system, HERA Z20, Samsung proposed ‘pediatric integrated solution’ encompassing the entire range of its medical diagnostic devices through this RSNA.

    In the ‘Ultrasound Zone,’ a dedicated probe for the pediatric cardiac diagnosis ‘TA2-9’ was unveiled for the first time at this exhibition. The TA2-9 with 42% smaller head than adult echocardiography probe aids in more accurate diagnosis for congenital heart disease or functional and structural abnormalities of heart through the oral route. Also on display was ‘L3-22’, a dedicated neonatal probe featuring a smaller head compared to an adult version offering a wide frequency range which enables pediatric body scan with a single device without the need to switch probes.

    All US Food and Drug Administration (FDA) 510(k) cleared products of Samsung digital X-ray have ‘low dose’ capability making it more appropriate for diagnosis of children and adolescents where safety is particularly prioritized. Samsung’s proprietary S-Vue™ imaging engine reduces radiation exposure by up to 50% compared to systems without this technology.

    At this exhibition, Samsung launched a new ‘floor-mounted’ digital X-ray, GF 85. The new digital X-ray, GF 85 launched by Samsung is relatively affordable compared to ceiling-mounted type and cost-effective with the ability to be installed in a small space without ceiling construction. Moreover, it provides clear image quality even with low dose and is equipped with advanced AI diagnostic assistance feature, fully inheriting all the advantages of previous digital X-ray models.

    NeuroLogica Corp, a subsidiary of Samsung Electronics, includes the OmniTom Elite mobile computed tomography (CT) in its portfolio, useful for imaging pediatric patients and at point-of-care, facilitating rapid clinical decision making and reducing transport related risks. Mobile CT is already recognized for its utility, with 8 out of the top 10 U.S. pediatric hospitals (as ranked by U.S. News for 2024-2025) utilizing the technology.

    NeuroLogica’s OmniTom Elite with photon counting detector (PCD) technology showcased this year’s at RSNA delivers ultra high-resolution CT imaging at the point-of-care using FDA 510(k) cleared PCD technology, surpassing conventional CT methods that rely on energy integrating detectors. By utilizing photon counting detectors to measure the energy of each individual photon, this cutting-edge technology enhances contrast differentiation and virtual monoenergetic imaging, empowering radiologists with greater confidence in diagnosing patients.

    Samsung provides opportunity to gain clinical application tips of Samsung medical devices and engage in Q&A with the global experts through Lunch & Learn session. In this session, a global breast imaging expert, Dr. Nina Vincoff shared a screening program using Samsung breast ultrasound solution and the latest insights on the FDA’s mandate for breast density information provision and implementation of additional imaging examination recommendation for dense breast (effective on September 10, 2024).

    Dr. Farhad Farzanegan in Kasier Permanente South Sacramento health system U.S. presented a case study on hospital workflow improvement based on the result of CT intervention procedure using Samsung mobile full-body CT, BodyTom.

    In the booth, Dr. Jon Jacobson, a musculoskeletal radiology expert, conducted live scan using a premium ultrasound diagnostic device, RS85 Prestige introducing clearer image quality and more sophisticated AI diagnostic assistance feature.

  • Unlock the Infinite Possibilities of XR With Galaxy AI

    Unlock the Infinite Possibilities of XR With Galaxy AI

    Imagine being able to step into any world in an instant — from the bustling streets of New York City to the snowy mountain tops of the Alps. These worlds are no longer merely places to observe from afar. They can now be explored and interacted with simply through a gaze, a gesture or your voice.

    What once seemed like science fiction has become a reality as eXtended reality (XR) transforms how we engage with the world around us.

    XR is an umbrella term for technologies that use digital elements to extend or alter reality by merging the physical and digital worlds together. This includes virtual reality (VR), augmented reality (AR), mixed reality (MR) as well as other similar technologies yet to be developed. XR offers infinite possibilities, creating a dynamic spatial canvas where users’ sight, sound and motion combine to interact with the outside world. A world that will unlock unprecedented experiences across core areas of life, from working and learning to entertainment, gaming and even health and wellness.

    We have always placed the user experience at the core of our innovation. It is our responsibility to bring the best possible technology and experience to our users, and we demonstrated this commitment by introducing and democratizing Galaxy AI. Grounded in mobile AI leadership, we truly believe now is the time to unlock the potential of XR. With the power of multimodal technology, our XR enables the most natural and intuitive interactions with the world. Supported by the broader Galaxy ecosystem, this technology will empower and transform your everyday life — in a way that only we can deliver.

    We are also making our vision a reality through open collaboration with industry leaders like Google and Qualcomm, culminating in the creation of an entirely new Android XR platform. For many years, we have worked side-by-side with partners, designing, integrating and optimizing technology — and this next project is one of our most ambitious endeavors yet.

    By uniting forward-thinking ideas with industry-leading expertise, we can ensure a robust and scalable platform that offers a wide range of content. From the Galaxy ecosystem and Google’s suite of apps to partnership with third-party developers, every XR interaction will be incredibly enriched.

    Available for both headsets and glasses, this new platform leverages the power of Gemini by bringing together a conversational user interface (UI) and a contextual understanding of the world around you. It offers cutting-edge capabilities beyond gestures or a controller, utilizing voice and natural conversation to elevate the experience. With these accurate, personalized interactions, the platform will be your helpful AI assistant.

    Code named “Project Moohan”, the first headset designed for Android XR is poised to bring this experience to life in the near future. The name “Moohan”, meaning ‘infinity’ in Korean, connotes our belief in delivering unparalleled, immersive experiences within an infinite space. Equipped with state-of-the-art displays, Passthrough capabilities and natural multi-modal input, this headset will be your spatial canvas to explore the world through Google Maps, enjoy a sports match on YouTube or plan trips with the help of Gemini. All these experiences come with lightweight, ergonomically optimized hardware designed to ensure maximum comfort during use.

    “XR has quickly shifted from a distant promise to a tangible reality. We believe it has the potential to unlock new and meaningful ways to interact with the world by truly resonating with your everyday lives, transcending physical boundaries,” said Won-Joon Choi, EVP and Head of R&D, Mobile eXperience Business. “We are excited to collaborate with Google to reshape the future of XR, taking our first step towards it with Project Moohan.”

    “We are at an inflection point for the XR, where breakthroughs in multimodal AI enable natural and intuitive ways to use technology in your everyday life”, said Sameer Samat, President of Android Ecosystem, Google. “We’re thrilled to partner with Samsung to build a new ecosystem with Android XR, transforming computing for everyone on next-generation devices like headsets, glasses and beyond.”

    The possibilities of XR are infinite — and we’re only getting started.

  • Samsung Project Infinity: The Team Keeping You Safe Online

    Samsung Project Infinity: The Team Keeping You Safe Online

    Beginning with the Galaxy S24 series, Samsung has been offering up to seven years of mobile security updates.1 As one of the longest periods of security support available for mobile devices, these updates mean customers can safely use their phones for longer.

    This peace of mind is important when navigating our hyperconnected age as cyber threats become more common than you think and are often undetectable until too late. The global cost of cybercrime is expected to surge in the next four years, rising from $9.22 trillion in 2024 to $13.82 trillion by 2028.2 Therefore, it is critical to use a device that benefits from an ecosystem of protective measures — such as security updates.

    But where do these updates come from, and why do they pop up on your phone so regularly? Deep at the heart of Samsung’s Mobile eXperience Business lies Samsung Project Infinity, a classified operation. Samsung Newsroom met the specialist units within Samsung Project Infinity who safeguard Galaxy devices and users around the clock.

    Deep Diving for Unknown Dangers

    The Cyber Threat Intelligence (CTI) taskforce is a reconnaissance unit within Samsung Project Infinity along with the Red (RED), Blue (BLUE) and Purple (PURPLE) Teams that go beyond lab conditions to identify real-world dangers. RED and BLUE perform proactive attack and defense functions, seeking out vulnerabilities and taking measures against them. PURPLE is a special operations unit that acts as both a sword and shield for specific critical areas. These teams are strategically deployed in various countries all over the world including Vietnam, Poland, Ukraine and Brazil.

    They work covertly. The only time you’ll ever feel their presence is when you get an update containing a security patch.

    CTI is dedicated to identifying potential threats and stopping hackers from taking control of your device by staying on top of the latest risks. They work to prevent malicious actions, address threats involving the trade of stolen information and ensure your smartphone or tablet stays securely under your control.

    The taskforce protects Galaxy’s internal infrastructure — safeguarding customer data and employee information such as access credentials — since any confidential information stolen by a hacker could be sold or abused for further attacks.

    To identify potential threats and deploy countermeasures, CTI regularly explores the Deep Web and the Dark Web — bustling markets for security exploits, spyware, malware, ransomware, illicit tools and confidential corporate and customer information.

    Justin Choi, Vice President and Head of the Security Team, Mobile eXperience Business at Samsung Electronics, leads CTI. With over 20 years of experience in the U.S. tech industry as a cybersecurity authority and ethical hacker, Choi has collaborated globally to fortify security for major financial and tech firms. His expertise in identifying and mitigating zero-day threats drives the development of advanced security measures that protect over a billion Galaxy users around the world.

    “Occasionally, we engage in security research by simulating real-world transactions,” said Choi. “We closely monitor forums and marketplaces for mentions of zero-day or N-day exploits targeting Galaxy devices, as well as any leaked intelligence that could potentially serve as an entry point for system infiltration.”

    As an ethical or “white hat” hacker — whose deep understanding of hacking helps to identify and address vulnerabilities — Choi explained that any hint of suspicious behavior within the system is swiftly traced to its origin.

    For example, request for excessive privileges, unexpected behavior, and network traffic with unknown servers could point to a potential breach, at which point CTI traces Indicators of Compromise to identify the threat actors and the purpose of the attacks.

    “Once we spot these kinds of threats, we collaborate with developers and operators to lock everything down for preventing attacks,” said Ranger, a CTI member. (Samsung Project Infinity staff protect their identities with aliases to avoid being personally targeted by hackers.) “We even communicate with other departments and partners on private channels to avoid taking any chances.”

    CTI also studies threat actors to decipher their behavioral patterns. Understanding their motivations and objectives can help reveal their attack methods and provide insights for fortification.

    “Sometimes, an attack is financially or politically motivated,” added Tower, another CTI member. “Sometimes, they just like to show off.”

    Eliminating Threats Before They Become Real

    While real-time threat detection is crucial, a robust offensive security policy is equally vital. RED and BLUE are inspired by military practices in which a red team simulates enemy attacks and a blue team creates defenses to ensure safety in the face of ever-changing threats. In Samsung’s approach, RED simulates hacker attacks and designs new attack scenarios to identify potential vulnerabilities, whereas BLUE develops and implements patches to protect against them.

    Specializing in combating zero-day attacks, the teams address vulnerabilities before they can be exploited to prevent unauthorized access or data breaches. One notable data breach is the Pegasus incident in 2020 that left an operating system vulnerable.

    The RED taskforce initiates their project by investigating Galaxy devices. They continuously use and analyze new features in Galaxy and delve into recently disclosed vulnerabilities, while envisioning potential security threats against users. By conducting diverse research, once they select a target that presents any potential risks to actual Galaxy users, the RED taskforce begins their quest to detect 0-day vulnerabilities in the target.

    “One thing we do is fuzzing,” said Arrowhead, a RED member. “That throws all kinds of unexpected data at software to uncover any hidden flaws.”

    Other methods such as code auditing as well as static and dynamic analyses help develop a comprehensive understanding of a system’s health and safety. The team contextualizes each threat in everyday scenarios to prevent threats to Galaxy devices.

    “It’s not so urgent if there’s a flaw with the alarm clock, but a glitch in location data could lead to somebody being unknowingly followed through their device,” added Gate, a BLUE member. “Once we discover a hypothetical weakness, we hurry to patch it and roll out an update to the relevant models.”

    The Specialists Among Specialists

    PURPLE acts as both aggressor and protector to ensure the security of critical areas, the key features of Galaxy devices. As the name suggests, PURPLE combines elements of RED and BLUE’s skillsets — however, an extra in-depth knowledge of the security measures built into the mobile devices sets this team apart.

    “Samsung collaborates with external security researchers to uncover vulnerabilities, but our own intimate knowledge of Galaxy systems allows for more effective targeting of potential weak spots,” said Sphinx, a PURPLE member.

    “The better you know a system, the better you can protect it,” added Oracle, another PURPLE member.

    Occasionally, PURPLE is called upon to address issues nobody else can including formulating new security requirements, designs and features. Though, it isn’t just about keeping Galaxy devices and the Samsung Knox security platform in good shape. Samsung also advises and proposes solutions to chipset and network vendors depending on their requirements.

    Samsung’s position as a hardware leader means the company can not only scale its security innovations but also cover its secure supply chain. In this way, Galaxy is contributing to the security of next generation of chips.

    Perhaps surprisingly, the motivation behind this work sometimes has nothing to do with technology. PURPLE members perform with a sense of duty to keep people safe, and they feel a certain pride and satisfaction in finding and addressing vulnerabilities.

    “It’s not just me but also my family and friends who use Galaxy,” continued Oracle. “So, let’s make it safe!”

    The bar for entry is high, and technical skills alone are not enough. To join the team, one must also demonstrate strength of character since any vulnerabilities discovered by the team could be very profitable in the wrong hands.

    “They must be tenacious and moral,” said Choi. “One must be responsible and put users before their personal interests.”

    “Being an early adopter and a big reader of tech trends is also useful,” added Sphinx.

    A System of Safeguards

    CTI, RED, BLUE and PURPLE are critical components of Galaxy’s security strategy — but Samsung Project Infinity juggles many initiatives including the Samsung Mobile Security Rewards Program which works with the wider security community to further scrutinize Galaxy’s defenses.

    This year, Samsung has boosted this program with a maximum reward amount of $1 million — its highest cash incentive yet for those who are able to identify the most severe attack scenarios within Galaxy devices.

    “It’s crucial to encourage participation from the security community in identifying potential vulnerabilities,” said Choi. “Especially in a world where cyberattacks are increasingly intelligent and disruptive.”

    All of this goes hand in hand with Samsung’s longstanding model of collaboration with hundreds of partners including carriers, service providers, chipset vendors and more. While regularly working with these partners as well as the wider community to identify threats and develop patches, Samsung Project Infinity ensures Samsung proactively takes initiative and responsibility for reinforcing its own areas of weakness.

    “Just because we have internal specialists, this doesn’t mean we don’t work with others,” added Choi. “Having more eyes gives us a better chance at spotting any vulnerabilities and helps us keep users safe.”

    So, are you still ignoring that notification now that you know it is from a team deeply committed to your security? Each of those notifications represents Samsung’s ongoing effort in keeping your data safe.

    The next time you see an update, don’t hesitate. Hit “install” and continue your online journey with peace of mind, knowing that there’s a whole team looking out for you.

    1 Timing and availability of security maintenance releases for Samsung Galaxy devices may vary by market, network provider and/or model.
    2 Statista Market Insight, “Cybercrime Expected To Skyrocket in Coming Years,” Chart: Cybercrime Expected To Skyrocket in Coming Yea
    Beginning with the Galaxy S24 series, Samsung has been offering up to seven years of mobile security updates.1 As one of the longest periods of security support available for mobile devices, these updates mean customers can safely use their phones for longer.

    This peace of mind is important when navigating our hyperconnected age as cyber threats become more common than you think and are often undetectable until too late. The global cost of cybercrime is expected to surge in the next four years, rising from $9.22 trillion in 2024 to $13.82 trillion by 2028.2 Therefore, it is critical to use a device that benefits from an ecosystem of protective measures — such as security updates.

    But where do these updates come from, and why do they pop up on your phone so regularly? Deep at the heart of Samsung’s Mobile eXperience Business lies Samsung Project Infinity, a classified operation. Samsung Newsroom met the specialist units within Samsung Project Infinity who safeguard Galaxy devices and users around the clock.

    Deep Diving for Unknown Dangers

    The Cyber Threat Intelligence (CTI) taskforce is a reconnaissance unit within Samsung Project Infinity along with the Red (RED), Blue (BLUE) and Purple (PURPLE) Teams that go beyond lab conditions to identify real-world dangers. RED and BLUE perform proactive attack and defense functions, seeking out vulnerabilities and taking measures against them. PURPLE is a special operations unit that acts as both a sword and shield for specific critical areas. These teams are strategically deployed in various countries all over the world including Vietnam, Poland, Ukraine and Brazil.

    They work covertly. The only time you’ll ever feel their presence is when you get an update containing a security patch.

    CTI is dedicated to identifying potential threats and stopping hackers from taking control of your device by staying on top of the latest risks. They work to prevent malicious actions, address threats involving the trade of stolen information and ensure your smartphone or tablet stays securely under your control.

    The taskforce protects Galaxy’s internal infrastructure — safeguarding customer data and employee information such as access credentials — since any confidential information stolen by a hacker could be sold or abused for further attacks.

    To identify potential threats and deploy countermeasures, CTI regularly explores the Deep Web and the Dark Web — bustling markets for security exploits, spyware, malware, ransomware, illicit tools and confidential corporate and customer information.

    Justin Choi, Vice President and Head of the Security Team, Mobile eXperience Business at Samsung Electronics, leads CTI. With over 20 years of experience in the U.S. tech industry as a cybersecurity authority and ethical hacker, Choi has collaborated globally to fortify security for major financial and tech firms. His expertise in identifying and mitigating zero-day threats drives the development of advanced security measures that protect over a billion Galaxy users around the world.

    “Occasionally, we engage in security research by simulating real-world transactions,” said Choi. “We closely monitor forums and marketplaces for mentions of zero-day or N-day exploits targeting Galaxy devices, as well as any leaked intelligence that could potentially serve as an entry point for system infiltration.”

    As an ethical or “white hat” hacker — whose deep understanding of hacking helps to identify and address vulnerabilities — Choi explained that any hint of suspicious behavior within the system is swiftly traced to its origin.

    For example, request for excessive privileges, unexpected behavior, and network traffic with unknown servers could point to a potential breach, at which point CTI traces Indicators of Compromise to identify the threat actors and the purpose of the attacks.

    “Once we spot these kinds of threats, we collaborate with developers and operators to lock everything down for preventing attacks,” said Ranger, a CTI member. (Samsung Project Infinity staff protect their identities with aliases to avoid being personally targeted by hackers.) “We even communicate with other departments and partners on private channels to avoid taking any chances.”

    CTI also studies threat actors to decipher their behavioral patterns. Understanding their motivations and objectives can help reveal their attack methods and provide insights for fortification.

    “Sometimes, an attack is financially or politically motivated,” added Tower, another CTI member. “Sometimes, they just like to show off.”

    Eliminating Threats Before They Become Real

    While real-time threat detection is crucial, a robust offensive security policy is equally vital. RED and BLUE are inspired by military practices in which a red team simulates enemy attacks and a blue team creates defenses to ensure safety in the face of ever-changing threats. In Samsung’s approach, RED simulates hacker attacks and designs new attack scenarios to identify potential vulnerabilities, whereas BLUE develops and implements patches to protect against them.

    Specializing in combating zero-day attacks, the teams address vulnerabilities before they can be exploited to prevent unauthorized access or data breaches. One notable data breach is the Pegasus incident in 2020 that left an operating system vulnerable.

    The RED taskforce initiates their project by investigating Galaxy devices. They continuously use and analyze new features in Galaxy and delve into recently disclosed vulnerabilities, while envisioning potential security threats against users. By conducting diverse research, once they select a target that presents any potential risks to actual Galaxy users, the RED taskforce begins their quest to detect 0-day vulnerabilities in the target.

    “One thing we do is fuzzing,” said Arrowhead, a RED member. “That throws all kinds of unexpected data at software to uncover any hidden flaws.”

    Other methods such as code auditing as well as static and dynamic analyses help develop a comprehensive understanding of a system’s health and safety. The team contextualizes each threat in everyday scenarios to prevent threats to Galaxy devices.

    “It’s not so urgent if there’s a flaw with the alarm clock, but a glitch in location data could lead to somebody being unknowingly followed through their device,” added Gate, a BLUE member. “Once we discover a hypothetical weakness, we hurry to patch it and roll out an update to the relevant models.”

    The Specialists Among Specialists

    PURPLE acts as both aggressor and protector to ensure the security of critical areas, the key features of Galaxy devices. As the name suggests, PURPLE combines elements of RED and BLUE’s skillsets — however, an extra in-depth knowledge of the security measures built into the mobile devices sets this team apart.

    “Samsung collaborates with external security researchers to uncover vulnerabilities, but our own intimate knowledge of Galaxy systems allows for more effective targeting of potential weak spots,” said Sphinx, a PURPLE member.

    “The better you know a system, the better you can protect it,” added Oracle, another PURPLE member.

    Occasionally, PURPLE is called upon to address issues nobody else can including formulating new security requirements, designs and features. Though, it isn’t just about keeping Galaxy devices and the Samsung Knox security platform in good shape. Samsung also advises and proposes solutions to chipset and network vendors depending on their requirements.

    Samsung’s position as a hardware leader means the company can not only scale its security innovations but also cover its secure supply chain. In this way, Galaxy is contributing to the security of next generation of chips.

    Perhaps surprisingly, the motivation behind this work sometimes has nothing to do with technology. PURPLE members perform with a sense of duty to keep people safe, and they feel a certain pride and satisfaction in finding and addressing vulnerabilities.

    “It’s not just me but also my family and friends who use Galaxy,” continued Oracle. “So, let’s make it safe!”

    The bar for entry is high, and technical skills alone are not enough. To join the team, one must also demonstrate strength of character since any vulnerabilities discovered by the team could be very profitable in the wrong hands.

    “They must be tenacious and moral,” said Choi. “One must be responsible and put users before their personal interests.”

    “Being an early adopter and a big reader of tech trends is also useful,” added Sphinx.

    A System of Safeguards

    CTI, RED, BLUE and PURPLE are critical components of Galaxy’s security strategy — but Samsung Project Infinity juggles many initiatives including the Samsung Mobile Security Rewards Program which works with the wider security community to further scrutinize Galaxy’s defenses.

    This year, Samsung has boosted this program with a maximum reward amount of $1 million — its highest cash incentive yet for those who are able to identify the most severe attack scenarios within Galaxy devices.

    “It’s crucial to encourage participation from the security community in identifying potential vulnerabilities,” said Choi. “Especially in a world where cyberattacks are increasingly intelligent and disruptive.”

    All of this goes hand in hand with Samsung’s longstanding model of collaboration with hundreds of partners including carriers, service providers, chipset vendors and more. While regularly working with these partners as well as the wider community to identify threats and develop patches, Samsung Project Infinity ensures Samsung proactively takes initiative and responsibility for reinforcing its own areas of weakness.

    “Just because we have internal specialists, this doesn’t mean we don’t work with others,” added Choi. “Having more eyes gives us a better chance at spotting any vulnerabilities and helps us keep users safe.”

    So, are you still ignoring that notification now that you know it is from a team deeply committed to your security? Each of those notifications represents Samsung’s ongoing effort in keeping your data safe.

    The next time you see an update, don’t hesitate. Hit “install” and continue your online journey with peace of mind, knowing that there’s a whole team looking out for you.

    1 Timing and availability of security maintenance releases for Samsung Galaxy devices may vary by market, network provider and/or model.
    2 Statista Market Insight, “Cybercrime Expected To Skyrocket in Coming Years,” Chart: Cybercrime Expected To Skyrocket in Coming Yea
    Beginning with the Galaxy S24 series, Samsung has been offering up to seven years of mobile security updates.1 As one of the longest periods of security support available for mobile devices, these updates mean customers can safely use their phones for longer.

    This peace of mind is important when navigating our hyperconnected age as cyber threats become more common than you think and are often undetectable until too late. The global cost of cybercrime is expected to surge in the next four years, rising from $9.22 trillion in 2024 to $13.82 trillion by 2028.2 Therefore, it is critical to use a device that benefits from an ecosystem of protective measures — such as security updates.

    But where do these updates come from, and why do they pop up on your phone so regularly? Deep at the heart of Samsung’s Mobile eXperience Business lies Samsung Project Infinity, a classified operation. Samsung Newsroom met the specialist units within Samsung Project Infinity who safeguard Galaxy devices and users around the clock.

    Deep Diving for Unknown Dangers

    The Cyber Threat Intelligence (CTI) taskforce is a reconnaissance unit within Samsung Project Infinity along with the Red (RED), Blue (BLUE) and Purple (PURPLE) Teams that go beyond lab conditions to identify real-world dangers. RED and BLUE perform proactive attack and defense functions, seeking out vulnerabilities and taking measures against them. PURPLE is a special operations unit that acts as both a sword and shield for specific critical areas. These teams are strategically deployed in various countries all over the world including Vietnam, Poland, Ukraine and Brazil.

    They work covertly. The only time you’ll ever feel their presence is when you get an update containing a security patch.

    CTI is dedicated to identifying potential threats and stopping hackers from taking control of your device by staying on top of the latest risks. They work to prevent malicious actions, address threats involving the trade of stolen information and ensure your smartphone or tablet stays securely under your control.

    The taskforce protects Galaxy’s internal infrastructure — safeguarding customer data and employee information such as access credentials — since any confidential information stolen by a hacker could be sold or abused for further attacks.

    To identify potential threats and deploy countermeasures, CTI regularly explores the Deep Web and the Dark Web — bustling markets for security exploits, spyware, malware, ransomware, illicit tools and confidential corporate and customer information.

    Justin Choi, Vice President and Head of the Security Team, Mobile eXperience Business at Samsung Electronics, leads CTI. With over 20 years of experience in the U.S. tech industry as a cybersecurity authority and ethical hacker, Choi has collaborated globally to fortify security for major financial and tech firms. His expertise in identifying and mitigating zero-day threats drives the development of advanced security measures that protect over a billion Galaxy users around the world.

    “Occasionally, we engage in security research by simulating real-world transactions,” said Choi. “We closely monitor forums and marketplaces for mentions of zero-day or N-day exploits targeting Galaxy devices, as well as any leaked intelligence that could potentially serve as an entry point for system infiltration.”

    As an ethical or “white hat” hacker — whose deep understanding of hacking helps to identify and address vulnerabilities — Choi explained that any hint of suspicious behavior within the system is swiftly traced to its origin.

    For example, request for excessive privileges, unexpected behavior, and network traffic with unknown servers could point to a potential breach, at which point CTI traces Indicators of Compromise to identify the threat actors and the purpose of the attacks.

    “Once we spot these kinds of threats, we collaborate with developers and operators to lock everything down for preventing attacks,” said Ranger, a CTI member. (Samsung Project Infinity staff protect their identities with aliases to avoid being personally targeted by hackers.) “We even communicate with other departments and partners on private channels to avoid taking any chances.”

    CTI also studies threat actors to decipher their behavioral patterns. Understanding their motivations and objectives can help reveal their attack methods and provide insights for fortification.

    “Sometimes, an attack is financially or politically motivated,” added Tower, another CTI member. “Sometimes, they just like to show off.”

    Eliminating Threats Before They Become Real

    While real-time threat detection is crucial, a robust offensive security policy is equally vital. RED and BLUE are inspired by military practices in which a red team simulates enemy attacks and a blue team creates defenses to ensure safety in the face of ever-changing threats. In Samsung’s approach, RED simulates hacker attacks and designs new attack scenarios to identify potential vulnerabilities, whereas BLUE develops and implements patches to protect against them.

    Specializing in combating zero-day attacks, the teams address vulnerabilities before they can be exploited to prevent unauthorized access or data breaches. One notable data breach is the Pegasus incident in 2020 that left an operating system vulnerable.

    The RED taskforce initiates their project by investigating Galaxy devices. They continuously use and analyze new features in Galaxy and delve into recently disclosed vulnerabilities, while envisioning potential security threats against users. By conducting diverse research, once they select a target that presents any potential risks to actual Galaxy users, the RED taskforce begins their quest to detect 0-day vulnerabilities in the target.

    “One thing we do is fuzzing,” said Arrowhead, a RED member. “That throws all kinds of unexpected data at software to uncover any hidden flaws.”

    Other methods such as code auditing as well as static and dynamic analyses help develop a comprehensive understanding of a system’s health and safety. The team contextualizes each threat in everyday scenarios to prevent threats to Galaxy devices.

    “It’s not so urgent if there’s a flaw with the alarm clock, but a glitch in location data could lead to somebody being unknowingly followed through their device,” added Gate, a BLUE member. “Once we discover a hypothetical weakness, we hurry to patch it and roll out an update to the relevant models.”

    The Specialists Among Specialists

    PURPLE acts as both aggressor and protector to ensure the security of critical areas, the key features of Galaxy devices. As the name suggests, PURPLE combines elements of RED and BLUE’s skillsets — however, an extra in-depth knowledge of the security measures built into the mobile devices sets this team apart.

    “Samsung collaborates with external security researchers to uncover vulnerabilities, but our own intimate knowledge of Galaxy systems allows for more effective targeting of potential weak spots,” said Sphinx, a PURPLE member.

    “The better you know a system, the better you can protect it,” added Oracle, another PURPLE member.

    Occasionally, PURPLE is called upon to address issues nobody else can including formulating new security requirements, designs and features. Though, it isn’t just about keeping Galaxy devices and the Samsung Knox security platform in good shape. Samsung also advises and proposes solutions to chipset and network vendors depending on their requirements.

    Samsung’s position as a hardware leader means the company can not only scale its security innovations but also cover its secure supply chain. In this way, Galaxy is contributing to the security of next generation of chips.

    Perhaps surprisingly, the motivation behind this work sometimes has nothing to do with technology. PURPLE members perform with a sense of duty to keep people safe, and they feel a certain pride and satisfaction in finding and addressing vulnerabilities.

    “It’s not just me but also my family and friends who use Galaxy,” continued Oracle. “So, let’s make it safe!”

    The bar for entry is high, and technical skills alone are not enough. To join the team, one must also demonstrate strength of character since any vulnerabilities discovered by the team could be very profitable in the wrong hands.

    “They must be tenacious and moral,” said Choi. “One must be responsible and put users before their personal interests.”

    “Being an early adopter and a big reader of tech trends is also useful,” added Sphinx.

    A System of Safeguards

    CTI, RED, BLUE and PURPLE are critical components of Galaxy’s security strategy — but Samsung Project Infinity juggles many initiatives including the Samsung Mobile Security Rewards Program which works with the wider security community to further scrutinize Galaxy’s defenses.

    This year, Samsung has boosted this program with a maximum reward amount of $1 million — its highest cash incentive yet for those who are able to identify the most severe attack scenarios within Galaxy devices.

    “It’s crucial to encourage participation from the security community in identifying potential vulnerabilities,” said Choi. “Especially in a world where cyberattacks are increasingly intelligent and disruptive.”

    All of this goes hand in hand with Samsung’s longstanding model of collaboration with hundreds of partners including carriers, service providers, chipset vendors and more. While regularly working with these partners as well as the wider community to identify threats and develop patches, Samsung Project Infinity ensures Samsung proactively takes initiative and responsibility for reinforcing its own areas of weakness.

    “Just because we have internal specialists, this doesn’t mean we don’t work with others,” added Choi. “Having more eyes gives us a better chance at spotting any vulnerabilities and helps us keep users safe.”

    So, are you still ignoring that notification now that you know it is from a team deeply committed to your security? Each of those notifications represents Samsung’s ongoing effort in keeping your data safe.

    The next time you see an update, don’t hesitate. Hit “install” and continue your online journey with peace of mind, knowing that there’s a whole team looking out for you.

    1 Timing and availability of security maintenance releases for Samsung Galaxy devices may vary by market, network provider and/or model.
    2 Statista Market Insight, “Cybercrime Expected To Skyrocket in Coming Years,” Chart: Cybercrime Expected To Skyrocket in Coming Yea
    Beginning with the Galaxy S24 series, Samsung has been offering up to seven years of mobile security updates.1 As one of the longest periods of security support available for mobile devices, these updates mean customers can safely use their phones for longer.

    This peace of mind is important when navigating our hyperconnected age as cyber threats become more common than you think and are often undetectable until too late. The global cost of cybercrime is expected to surge in the next four years, rising from $9.22 trillion in 2024 to $13.82 trillion by 2028.2 Therefore, it is critical to use a device that benefits from an ecosystem of protective measures — such as security updates.

    But where do these updates come from, and why do they pop up on your phone so regularly? Deep at the heart of Samsung’s Mobile eXperience Business lies Samsung Project Infinity, a classified operation. Samsung Newsroom met the specialist units within Samsung Project Infinity who safeguard Galaxy devices and users around the clock.

    Deep Diving for Unknown Dangers

    The Cyber Threat Intelligence (CTI) taskforce is a reconnaissance unit within Samsung Project Infinity along with the Red (RED), Blue (BLUE) and Purple (PURPLE) Teams that go beyond lab conditions to identify real-world dangers. RED and BLUE perform proactive attack and defense functions, seeking out vulnerabilities and taking measures against them. PURPLE is a special operations unit that acts as both a sword and shield for specific critical areas. These teams are strategically deployed in various countries all over the world including Vietnam, Poland, Ukraine and Brazil.

    They work covertly. The only time you’ll ever feel their presence is when you get an update containing a security patch.

    CTI is dedicated to identifying potential threats and stopping hackers from taking control of your device by staying on top of the latest risks. They work to prevent malicious actions, address threats involving the trade of stolen information and ensure your smartphone or tablet stays securely under your control.

    The taskforce protects Galaxy’s internal infrastructure — safeguarding customer data and employee information such as access credentials — since any confidential information stolen by a hacker could be sold or abused for further attacks.

    To identify potential threats and deploy countermeasures, CTI regularly explores the Deep Web and the Dark Web — bustling markets for security exploits, spyware, malware, ransomware, illicit tools and confidential corporate and customer information.

    Justin Choi, Vice President and Head of the Security Team, Mobile eXperience Business at Samsung Electronics, leads CTI. With over 20 years of experience in the U.S. tech industry as a cybersecurity authority and ethical hacker, Choi has collaborated globally to fortify security for major financial and tech firms. His expertise in identifying and mitigating zero-day threats drives the development of advanced security measures that protect over a billion Galaxy users around the world.

    “Occasionally, we engage in security research by simulating real-world transactions,” said Choi. “We closely monitor forums and marketplaces for mentions of zero-day or N-day exploits targeting Galaxy devices, as well as any leaked intelligence that could potentially serve as an entry point for system infiltration.”

    As an ethical or “white hat” hacker — whose deep understanding of hacking helps to identify and address vulnerabilities — Choi explained that any hint of suspicious behavior within the system is swiftly traced to its origin.

    For example, request for excessive privileges, unexpected behavior, and network traffic with unknown servers could point to a potential breach, at which point CTI traces Indicators of Compromise to identify the threat actors and the purpose of the attacks.

    “Once we spot these kinds of threats, we collaborate with developers and operators to lock everything down for preventing attacks,” said Ranger, a CTI member. (Samsung Project Infinity staff protect their identities with aliases to avoid being personally targeted by hackers.) “We even communicate with other departments and partners on private channels to avoid taking any chances.”

    CTI also studies threat actors to decipher their behavioral patterns. Understanding their motivations and objectives can help reveal their attack methods and provide insights for fortification.

    “Sometimes, an attack is financially or politically motivated,” added Tower, another CTI member. “Sometimes, they just like to show off.”

    Eliminating Threats Before They Become Real

    While real-time threat detection is crucial, a robust offensive security policy is equally vital. RED and BLUE are inspired by military practices in which a red team simulates enemy attacks and a blue team creates defenses to ensure safety in the face of ever-changing threats. In Samsung’s approach, RED simulates hacker attacks and designs new attack scenarios to identify potential vulnerabilities, whereas BLUE develops and implements patches to protect against them.

    Specializing in combating zero-day attacks, the teams address vulnerabilities before they can be exploited to prevent unauthorized access or data breaches. One notable data breach is the Pegasus incident in 2020 that left an operating system vulnerable.

    The RED taskforce initiates their project by investigating Galaxy devices. They continuously use and analyze new features in Galaxy and delve into recently disclosed vulnerabilities, while envisioning potential security threats against users. By conducting diverse research, once they select a target that presents any potential risks to actual Galaxy users, the RED taskforce begins their quest to detect 0-day vulnerabilities in the target.

    “One thing we do is fuzzing,” said Arrowhead, a RED member. “That throws all kinds of unexpected data at software to uncover any hidden flaws.”

    Other methods such as code auditing as well as static and dynamic analyses help develop a comprehensive understanding of a system’s health and safety. The team contextualizes each threat in everyday scenarios to prevent threats to Galaxy devices.

    “It’s not so urgent if there’s a flaw with the alarm clock, but a glitch in location data could lead to somebody being unknowingly followed through their device,” added Gate, a BLUE member. “Once we discover a hypothetical weakness, we hurry to patch it and roll out an update to the relevant models.”

    The Specialists Among Specialists

    PURPLE acts as both aggressor and protector to ensure the security of critical areas, the key features of Galaxy devices. As the name suggests, PURPLE combines elements of RED and BLUE’s skillsets — however, an extra in-depth knowledge of the security measures built into the mobile devices sets this team apart.

    “Samsung collaborates with external security researchers to uncover vulnerabilities, but our own intimate knowledge of Galaxy systems allows for more effective targeting of potential weak spots,” said Sphinx, a PURPLE member.

    “The better you know a system, the better you can protect it,” added Oracle, another PURPLE member.

    Occasionally, PURPLE is called upon to address issues nobody else can including formulating new security requirements, designs and features. Though, it isn’t just about keeping Galaxy devices and the Samsung Knox security platform in good shape. Samsung also advises and proposes solutions to chipset and network vendors depending on their requirements.

    Samsung’s position as a hardware leader means the company can not only scale its security innovations but also cover its secure supply chain. In this way, Galaxy is contributing to the security of next generation of chips.

    Perhaps surprisingly, the motivation behind this work sometimes has nothing to do with technology. PURPLE members perform with a sense of duty to keep people safe, and they feel a certain pride and satisfaction in finding and addressing vulnerabilities.

    “It’s not just me but also my family and friends who use Galaxy,” continued Oracle. “So, let’s make it safe!”

    The bar for entry is high, and technical skills alone are not enough. To join the team, one must also demonstrate strength of character since any vulnerabilities discovered by the team could be very profitable in the wrong hands.

    “They must be tenacious and moral,” said Choi. “One must be responsible and put users before their personal interests.”

    “Being an early adopter and a big reader of tech trends is also useful,” added Sphinx.

    A System of Safeguards

    CTI, RED, BLUE and PURPLE are critical components of Galaxy’s security strategy — but Samsung Project Infinity juggles many initiatives including the Samsung Mobile Security Rewards Program which works with the wider security community to further scrutinize Galaxy’s defenses.

    This year, Samsung has boosted this program with a maximum reward amount of $1 million — its highest cash incentive yet for those who are able to identify the most severe attack scenarios within Galaxy devices.

    “It’s crucial to encourage participation from the security community in identifying potential vulnerabilities,” said Choi. “Especially in a world where cyberattacks are increasingly intelligent and disruptive.”

    All of this goes hand in hand with Samsung’s longstanding model of collaboration with hundreds of partners including carriers, service providers, chipset vendors and more. While regularly working with these partners as well as the wider community to identify threats and develop patches, Samsung Project Infinity ensures Samsung proactively takes initiative and responsibility for reinforcing its own areas of weakness.

    “Just because we have internal specialists, this doesn’t mean we don’t work with others,” added Choi. “Having more eyes gives us a better chance at spotting any vulnerabilities and helps us keep users safe.”

    So, are you still ignoring that notification now that you know it is from a team deeply committed to your security? Each of those notifications represents Samsung’s ongoing effort in keeping your data safe.

    The next time you see an update, don’t hesitate. Hit “install” and continue your online journey with peace of mind, knowing that there’s a whole team looking out for you.

    1 Timing and availability of security maintenance releases for Samsung Galaxy devices may vary by market, network provider and/or model.
    2 Statista Market Insight, “Cybercrime Expected To Skyrocket in Coming Years,” Chart: Cybercrime Expected To Skyrocket in Coming Yea
    Beginning with the Galaxy S24 series, Samsung has been offering up to seven years of mobile security updates.1 As one of the longest periods of security support available for mobile devices, these updates mean customers can safely use their phones for longer.

    This peace of mind is important when navigating our hyperconnected age as cyber threats become more common than you think and are often undetectable until too late. The global cost of cybercrime is expected to surge in the next four years, rising from $9.22 trillion in 2024 to $13.82 trillion by 2028.2 Therefore, it is critical to use a device that benefits from an ecosystem of protective measures — such as security updates.

    But where do these updates come from, and why do they pop up on your phone so regularly? Deep at the heart of Samsung’s Mobile eXperience Business lies Samsung Project Infinity, a classified operation. Samsung Newsroom met the specialist units within Samsung Project Infinity who safeguard Galaxy devices and users around the clock.

    Deep Diving for Unknown Dangers

    The Cyber Threat Intelligence (CTI) taskforce is a reconnaissance unit within Samsung Project Infinity along with the Red (RED), Blue (BLUE) and Purple (PURPLE) Teams that go beyond lab conditions to identify real-world dangers. RED and BLUE perform proactive attack and defense functions, seeking out vulnerabilities and taking measures against them. PURPLE is a special operations unit that acts as both a sword and shield for specific critical areas. These teams are strategically deployed in various countries all over the world including Vietnam, Poland, Ukraine and Brazil.

    They work covertly. The only time you’ll ever feel their presence is when you get an update containing a security patch.

    CTI is dedicated to identifying potential threats and stopping hackers from taking control of your device by staying on top of the latest risks. They work to prevent malicious actions, address threats involving the trade of stolen information and ensure your smartphone or tablet stays securely under your control.

    The taskforce protects Galaxy’s internal infrastructure — safeguarding customer data and employee information such as access credentials — since any confidential information stolen by a hacker could be sold or abused for further attacks.

    To identify potential threats and deploy countermeasures, CTI regularly explores the Deep Web and the Dark Web — bustling markets for security exploits, spyware, malware, ransomware, illicit tools and confidential corporate and customer information.

    Justin Choi, Vice President and Head of the Security Team, Mobile eXperience Business at Samsung Electronics, leads CTI. With over 20 years of experience in the U.S. tech industry as a cybersecurity authority and ethical hacker, Choi has collaborated globally to fortify security for major financial and tech firms. His expertise in identifying and mitigating zero-day threats drives the development of advanced security measures that protect over a billion Galaxy users around the world.

    “Occasionally, we engage in security research by simulating real-world transactions,” said Choi. “We closely monitor forums and marketplaces for mentions of zero-day or N-day exploits targeting Galaxy devices, as well as any leaked intelligence that could potentially serve as an entry point for system infiltration.”

    As an ethical or “white hat” hacker — whose deep understanding of hacking helps to identify and address vulnerabilities — Choi explained that any hint of suspicious behavior within the system is swiftly traced to its origin.

    For example, request for excessive privileges, unexpected behavior, and network traffic with unknown servers could point to a potential breach, at which point CTI traces Indicators of Compromise to identify the threat actors and the purpose of the attacks.

    “Once we spot these kinds of threats, we collaborate with developers and operators to lock everything down for preventing attacks,” said Ranger, a CTI member. (Samsung Project Infinity staff protect their identities with aliases to avoid being personally targeted by hackers.) “We even communicate with other departments and partners on private channels to avoid taking any chances.”

    CTI also studies threat actors to decipher their behavioral patterns. Understanding their motivations and objectives can help reveal their attack methods and provide insights for fortification.

    “Sometimes, an attack is financially or politically motivated,” added Tower, another CTI member. “Sometimes, they just like to show off.”

    Eliminating Threats Before They Become Real

    While real-time threat detection is crucial, a robust offensive security policy is equally vital. RED and BLUE are inspired by military practices in which a red team simulates enemy attacks and a blue team creates defenses to ensure safety in the face of ever-changing threats. In Samsung’s approach, RED simulates hacker attacks and designs new attack scenarios to identify potential vulnerabilities, whereas BLUE develops and implements patches to protect against them.

    Specializing in combating zero-day attacks, the teams address vulnerabilities before they can be exploited to prevent unauthorized access or data breaches. One notable data breach is the Pegasus incident in 2020 that left an operating system vulnerable.

    The RED taskforce initiates their project by investigating Galaxy devices. They continuously use and analyze new features in Galaxy and delve into recently disclosed vulnerabilities, while envisioning potential security threats against users. By conducting diverse research, once they select a target that presents any potential risks to actual Galaxy users, the RED taskforce begins their quest to detect 0-day vulnerabilities in the target.

    “One thing we do is fuzzing,” said Arrowhead, a RED member. “That throws all kinds of unexpected data at software to uncover any hidden flaws.”

    Other methods such as code auditing as well as static and dynamic analyses help develop a comprehensive understanding of a system’s health and safety. The team contextualizes each threat in everyday scenarios to prevent threats to Galaxy devices.

    “It’s not so urgent if there’s a flaw with the alarm clock, but a glitch in location data could lead to somebody being unknowingly followed through their device,” added Gate, a BLUE member. “Once we discover a hypothetical weakness, we hurry to patch it and roll out an update to the relevant models.”

    The Specialists Among Specialists

    PURPLE acts as both aggressor and protector to ensure the security of critical areas, the key features of Galaxy devices. As the name suggests, PURPLE combines elements of RED and BLUE’s skillsets — however, an extra in-depth knowledge of the security measures built into the mobile devices sets this team apart.

    “Samsung collaborates with external security researchers to uncover vulnerabilities, but our own intimate knowledge of Galaxy systems allows for more effective targeting of potential weak spots,” said Sphinx, a PURPLE member.

    “The better you know a system, the better you can protect it,” added Oracle, another PURPLE member.

    Occasionally, PURPLE is called upon to address issues nobody else can including formulating new security requirements, designs and features. Though, it isn’t just about keeping Galaxy devices and the Samsung Knox security platform in good shape. Samsung also advises and proposes solutions to chipset and network vendors depending on their requirements.

    Samsung’s position as a hardware leader means the company can not only scale its security innovations but also cover its secure supply chain. In this way, Galaxy is contributing to the security of next generation of chips.

    Perhaps surprisingly, the motivation behind this work sometimes has nothing to do with technology. PURPLE members perform with a sense of duty to keep people safe, and they feel a certain pride and satisfaction in finding and addressing vulnerabilities.

    “It’s not just me but also my family and friends who use Galaxy,” continued Oracle. “So, let’s make it safe!”

    The bar for entry is high, and technical skills alone are not enough. To join the team, one must also demonstrate strength of character since any vulnerabilities discovered by the team could be very profitable in the wrong hands.

    “They must be tenacious and moral,” said Choi. “One must be responsible and put users before their personal interests.”

    “Being an early adopter and a big reader of tech trends is also useful,” added Sphinx.

    A System of Safeguards

    CTI, RED, BLUE and PURPLE are critical components of Galaxy’s security strategy — but Samsung Project Infinity juggles many initiatives including the Samsung Mobile Security Rewards Program which works with the wider security community to further scrutinize Galaxy’s defenses.

    This year, Samsung has boosted this program with a maximum reward amount of $1 million — its highest cash incentive yet for those who are able to identify the most severe attack scenarios within Galaxy devices.

    “It’s crucial to encourage participation from the security community in identifying potential vulnerabilities,” said Choi. “Especially in a world where cyberattacks are increasingly intelligent and disruptive.”

    All of this goes hand in hand with Samsung’s longstanding model of collaboration with hundreds of partners including carriers, service providers, chipset vendors and more. While regularly working with these partners as well as the wider community to identify threats and develop patches, Samsung Project Infinity ensures Samsung proactively takes initiative and responsibility for reinforcing its own areas of weakness.

    “Just because we have internal specialists, this doesn’t mean we don’t work with others,” added Choi. “Having more eyes gives us a better chance at spotting any vulnerabilities and helps us keep users safe.”

    So, are you still ignoring that notification now that you know it is from a team deeply committed to your security? Each of those notifications represents Samsung’s ongoing effort in keeping your data safe.

    The next time you see an update, don’t hesitate. Hit “install” and continue your online journey with peace of mind, knowing that there’s a whole team looking out for you.

    1 Timing and availability of security maintenance releases for Samsung Galaxy devices may vary by market, network provider and/or model.
    2 Statista Market Insight, “Cybercrime Expected To Skyrocket in Coming Years,” Chart: Cybercrime Expected To Skyrocket in Coming Yea
    Beginning with the Galaxy S24 series, Samsung has been offering up to seven years of mobile security updates.1 As one of the longest periods of security support available for mobile devices, these updates mean customers can safely use their phones for longer.

    This peace of mind is important when navigating our hyperconnected age as cyber threats become more common than you think and are often undetectable until too late. The global cost of cybercrime is expected to surge in the next four years, rising from $9.22 trillion in 2024 to $13.82 trillion by 2028.2 Therefore, it is critical to use a device that benefits from an ecosystem of protective measures — such as security updates.

    But where do these updates come from, and why do they pop up on your phone so regularly? Deep at the heart of Samsung’s Mobile eXperience Business lies Samsung Project Infinity, a classified operation. Samsung Newsroom met the specialist units within Samsung Project Infinity who safeguard Galaxy devices and users around the clock.

    Deep Diving for Unknown Dangers

    The Cyber Threat Intelligence (CTI) taskforce is a reconnaissance unit within Samsung Project Infinity along with the Red (RED), Blue (BLUE) and Purple (PURPLE) Teams that go beyond lab conditions to identify real-world dangers. RED and BLUE perform proactive attack and defense functions, seeking out vulnerabilities and taking measures against them. PURPLE is a special operations unit that acts as both a sword and shield for specific critical areas. These teams are strategically deployed in various countries all over the world including Vietnam, Poland, Ukraine and Brazil.

    They work covertly. The only time you’ll ever feel their presence is when you get an update containing a security patch.

    CTI is dedicated to identifying potential threats and stopping hackers from taking control of your device by staying on top of the latest risks. They work to prevent malicious actions, address threats involving the trade of stolen information and ensure your smartphone or tablet stays securely under your control.

    The taskforce protects Galaxy’s internal infrastructure — safeguarding customer data and employee information such as access credentials — since any confidential information stolen by a hacker could be sold or abused for further attacks.

    To identify potential threats and deploy countermeasures, CTI regularly explores the Deep Web and the Dark Web — bustling markets for security exploits, spyware, malware, ransomware, illicit tools and confidential corporate and customer information.

    Justin Choi, Vice President and Head of the Security Team, Mobile eXperience Business at Samsung Electronics, leads CTI. With over 20 years of experience in the U.S. tech industry as a cybersecurity authority and ethical hacker, Choi has collaborated globally to fortify security for major financial and tech firms. His expertise in identifying and mitigating zero-day threats drives the development of advanced security measures that protect over a billion Galaxy users around the world.

    “Occasionally, we engage in security research by simulating real-world transactions,” said Choi. “We closely monitor forums and marketplaces for mentions of zero-day or N-day exploits targeting Galaxy devices, as well as any leaked intelligence that could potentially serve as an entry point for system infiltration.”

    As an ethical or “white hat” hacker — whose deep understanding of hacking helps to identify and address vulnerabilities — Choi explained that any hint of suspicious behavior within the system is swiftly traced to its origin.

    For example, request for excessive privileges, unexpected behavior, and network traffic with unknown servers could point to a potential breach, at which point CTI traces Indicators of Compromise to identify the threat actors and the purpose of the attacks.

    “Once we spot these kinds of threats, we collaborate with developers and operators to lock everything down for preventing attacks,” said Ranger, a CTI member. (Samsung Project Infinity staff protect their identities with aliases to avoid being personally targeted by hackers.) “We even communicate with other departments and partners on private channels to avoid taking any chances.”

    CTI also studies threat actors to decipher their behavioral patterns. Understanding their motivations and objectives can help reveal their attack methods and provide insights for fortification.

    “Sometimes, an attack is financially or politically motivated,” added Tower, another CTI member. “Sometimes, they just like to show off.”

    Eliminating Threats Before They Become Real

    While real-time threat detection is crucial, a robust offensive security policy is equally vital. RED and BLUE are inspired by military practices in which a red team simulates enemy attacks and a blue team creates defenses to ensure safety in the face of ever-changing threats. In Samsung’s approach, RED simulates hacker attacks and designs new attack scenarios to identify potential vulnerabilities, whereas BLUE develops and implements patches to protect against them.

    Specializing in combating zero-day attacks, the teams address vulnerabilities before they can be exploited to prevent unauthorized access or data breaches. One notable data breach is the Pegasus incident in 2020 that left an operating system vulnerable.

    The RED taskforce initiates their project by investigating Galaxy devices. They continuously use and analyze new features in Galaxy and delve into recently disclosed vulnerabilities, while envisioning potential security threats against users. By conducting diverse research, once they select a target that presents any potential risks to actual Galaxy users, the RED taskforce begins their quest to detect 0-day vulnerabilities in the target.

    “One thing we do is fuzzing,” said Arrowhead, a RED member. “That throws all kinds of unexpected data at software to uncover any hidden flaws.”

    Other methods such as code auditing as well as static and dynamic analyses help develop a comprehensive understanding of a system’s health and safety. The team contextualizes each threat in everyday scenarios to prevent threats to Galaxy devices.

    “It’s not so urgent if there’s a flaw with the alarm clock, but a glitch in location data could lead to somebody being unknowingly followed through their device,” added Gate, a BLUE member. “Once we discover a hypothetical weakness, we hurry to patch it and roll out an update to the relevant models.”

    The Specialists Among Specialists

    PURPLE acts as both aggressor and protector to ensure the security of critical areas, the key features of Galaxy devices. As the name suggests, PURPLE combines elements of RED and BLUE’s skillsets — however, an extra in-depth knowledge of the security measures built into the mobile devices sets this team apart.

    “Samsung collaborates with external security researchers to uncover vulnerabilities, but our own intimate knowledge of Galaxy systems allows for more effective targeting of potential weak spots,” said Sphinx, a PURPLE member.

    “The better you know a system, the better you can protect it,” added Oracle, another PURPLE member.

    Occasionally, PURPLE is called upon to address issues nobody else can including formulating new security requirements, designs and features. Though, it isn’t just about keeping Galaxy devices and the Samsung Knox security platform in good shape. Samsung also advises and proposes solutions to chipset and network vendors depending on their requirements.

    Samsung’s position as a hardware leader means the company can not only scale its security innovations but also cover its secure supply chain. In this way, Galaxy is contributing to the security of next generation of chips.

    Perhaps surprisingly, the motivation behind this work sometimes has nothing to do with technology. PURPLE members perform with a sense of duty to keep people safe, and they feel a certain pride and satisfaction in finding and addressing vulnerabilities.

    “It’s not just me but also my family and friends who use Galaxy,” continued Oracle. “So, let’s make it safe!”

    The bar for entry is high, and technical skills alone are not enough. To join the team, one must also demonstrate strength of character since any vulnerabilities discovered by the team could be very profitable in the wrong hands.

    “They must be tenacious and moral,” said Choi. “One must be responsible and put users before their personal interests.”

    “Being an early adopter and a big reader of tech trends is also useful,” added Sphinx.

    A System of Safeguards

    CTI, RED, BLUE and PURPLE are critical components of Galaxy’s security strategy — but Samsung Project Infinity juggles many initiatives including the Samsung Mobile Security Rewards Program which works with the wider security community to further scrutinize Galaxy’s defenses.

    This year, Samsung has boosted this program with a maximum reward amount of $1 million — its highest cash incentive yet for those who are able to identify the most severe attack scenarios within Galaxy devices.

    “It’s crucial to encourage participation from the security community in identifying potential vulnerabilities,” said Choi. “Especially in a world where cyberattacks are increasingly intelligent and disruptive.”

    All of this goes hand in hand with Samsung’s longstanding model of collaboration with hundreds of partners including carriers, service providers, chipset vendors and more. While regularly working with these partners as well as the wider community to identify threats and develop patches, Samsung Project Infinity ensures Samsung proactively takes initiative and responsibility for reinforcing its own areas of weakness.

    “Just because we have internal specialists, this doesn’t mean we don’t work with others,” added Choi. “Having more eyes gives us a better chance at spotting any vulnerabilities and helps us keep users safe.”

    So, are you still ignoring that notification now that you know it is from a team deeply committed to your security? Each of those notifications represents Samsung’s ongoing effort in keeping your data safe.

    The next time you see an update, don’t hesitate. Hit “install” and continue your online journey with peace of mind, knowing that there’s a whole team looking out for you.

    1 Timing and availability of security maintenance releases for Samsung Galaxy devices may vary by market, network provider and/or model.
    2 Statista Market Insight, “Cybercrime Expected To Skyrocket in Coming Years,” Chart: Cybercrime Expected To Skyrocket in Coming Yea
    Beginning with the Galaxy S24 series, Samsung has been offering up to seven years of mobile security updates.1 As one of the longest periods of security support available for mobile devices, these updates mean customers can safely use their phones for longer.

    This peace of mind is important when navigating our hyperconnected age as cyber threats become more common than you think and are often undetectable until too late. The global cost of cybercrime is expected to surge in the next four years, rising from $9.22 trillion in 2024 to $13.82 trillion by 2028.2 Therefore, it is critical to use a device that benefits from an ecosystem of protective measures — such as security updates.

    But where do these updates come from, and why do they pop up on your phone so regularly? Deep at the heart of Samsung’s Mobile eXperience Business lies Samsung Project Infinity, a classified operation. Samsung Newsroom met the specialist units within Samsung Project Infinity who safeguard Galaxy devices and users around the clock.

    Deep Diving for Unknown Dangers

    The Cyber Threat Intelligence (CTI) taskforce is a reconnaissance unit within Samsung Project Infinity along with the Red (RED), Blue (BLUE) and Purple (PURPLE) Teams that go beyond lab conditions to identify real-world dangers. RED and BLUE perform proactive attack and defense functions, seeking out vulnerabilities and taking measures against them. PURPLE is a special operations unit that acts as both a sword and shield for specific critical areas. These teams are strategically deployed in various countries all over the world including Vietnam, Poland, Ukraine and Brazil.

    They work covertly. The only time you’ll ever feel their presence is when you get an update containing a security patch.

    CTI is dedicated to identifying potential threats and stopping hackers from taking control of your device by staying on top of the latest risks. They work to prevent malicious actions, address threats involving the trade of stolen information and ensure your smartphone or tablet stays securely under your control.

    The taskforce protects Galaxy’s internal infrastructure — safeguarding customer data and employee information such as access credentials — since any confidential information stolen by a hacker could be sold or abused for further attacks.

    To identify potential threats and deploy countermeasures, CTI regularly explores the Deep Web and the Dark Web — bustling markets for security exploits, spyware, malware, ransomware, illicit tools and confidential corporate and customer information.

    Justin Choi, Vice President and Head of the Security Team, Mobile eXperience Business at Samsung Electronics, leads CTI. With over 20 years of experience in the U.S. tech industry as a cybersecurity authority and ethical hacker, Choi has collaborated globally to fortify security for major financial and tech firms. His expertise in identifying and mitigating zero-day threats drives the development of advanced security measures that protect over a billion Galaxy users around the world.

    “Occasionally, we engage in security research by simulating real-world transactions,” said Choi. “We closely monitor forums and marketplaces for mentions of zero-day or N-day exploits targeting Galaxy devices, as well as any leaked intelligence that could potentially serve as an entry point for system infiltration.”

    As an ethical or “white hat” hacker — whose deep understanding of hacking helps to identify and address vulnerabilities — Choi explained that any hint of suspicious behavior within the system is swiftly traced to its origin.

    For example, request for excessive privileges, unexpected behavior, and network traffic with unknown servers could point to a potential breach, at which point CTI traces Indicators of Compromise to identify the threat actors and the purpose of the attacks.

    “Once we spot these kinds of threats, we collaborate with developers and operators to lock everything down for preventing attacks,” said Ranger, a CTI member. (Samsung Project Infinity staff protect their identities with aliases to avoid being personally targeted by hackers.) “We even communicate with other departments and partners on private channels to avoid taking any chances.”

    CTI also studies threat actors to decipher their behavioral patterns. Understanding their motivations and objectives can help reveal their attack methods and provide insights for fortification.

    “Sometimes, an attack is financially or politically motivated,” added Tower, another CTI member. “Sometimes, they just like to show off.”

    Eliminating Threats Before They Become Real

    While real-time threat detection is crucial, a robust offensive security policy is equally vital. RED and BLUE are inspired by military practices in which a red team simulates enemy attacks and a blue team creates defenses to ensure safety in the face of ever-changing threats. In Samsung’s approach, RED simulates hacker attacks and designs new attack scenarios to identify potential vulnerabilities, whereas BLUE develops and implements patches to protect against them.

    Specializing in combating zero-day attacks, the teams address vulnerabilities before they can be exploited to prevent unauthorized access or data breaches. One notable data breach is the Pegasus incident in 2020 that left an operating system vulnerable.

    The RED taskforce initiates their project by investigating Galaxy devices. They continuously use and analyze new features in Galaxy and delve into recently disclosed vulnerabilities, while envisioning potential security threats against users. By conducting diverse research, once they select a target that presents any potential risks to actual Galaxy users, the RED taskforce begins their quest to detect 0-day vulnerabilities in the target.

    “One thing we do is fuzzing,” said Arrowhead, a RED member. “That throws all kinds of unexpected data at software to uncover any hidden flaws.”

    Other methods such as code auditing as well as static and dynamic analyses help develop a comprehensive understanding of a system’s health and safety. The team contextualizes each threat in everyday scenarios to prevent threats to Galaxy devices.

    “It’s not so urgent if there’s a flaw with the alarm clock, but a glitch in location data could lead to somebody being unknowingly followed through their device,” added Gate, a BLUE member. “Once we discover a hypothetical weakness, we hurry to patch it and roll out an update to the relevant models.”

    The Specialists Among Specialists

    PURPLE acts as both aggressor and protector to ensure the security of critical areas, the key features of Galaxy devices. As the name suggests, PURPLE combines elements of RED and BLUE’s skillsets — however, an extra in-depth knowledge of the security measures built into the mobile devices sets this team apart.

    “Samsung collaborates with external security researchers to uncover vulnerabilities, but our own intimate knowledge of Galaxy systems allows for more effective targeting of potential weak spots,” said Sphinx, a PURPLE member.

    “The better you know a system, the better you can protect it,” added Oracle, another PURPLE member.

    Occasionally, PURPLE is called upon to address issues nobody else can including formulating new security requirements, designs and features. Though, it isn’t just about keeping Galaxy devices and the Samsung Knox security platform in good shape. Samsung also advises and proposes solutions to chipset and network vendors depending on their requirements.

    Samsung’s position as a hardware leader means the company can not only scale its security innovations but also cover its secure supply chain. In this way, Galaxy is contributing to the security of next generation of chips.

    Perhaps surprisingly, the motivation behind this work sometimes has nothing to do with technology. PURPLE members perform with a sense of duty to keep people safe, and they feel a certain pride and satisfaction in finding and addressing vulnerabilities.

    “It’s not just me but also my family and friends who use Galaxy,” continued Oracle. “So, let’s make it safe!”

    The bar for entry is high, and technical skills alone are not enough. To join the team, one must also demonstrate strength of character since any vulnerabilities discovered by the team could be very profitable in the wrong hands.

    “They must be tenacious and moral,” said Choi. “One must be responsible and put users before their personal interests.”

    “Being an early adopter and a big reader of tech trends is also useful,” added Sphinx.

    A System of Safeguards

    CTI, RED, BLUE and PURPLE are critical components of Galaxy’s security strategy — but Samsung Project Infinity juggles many initiatives including the Samsung Mobile Security Rewards Program which works with the wider security community to further scrutinize Galaxy’s defenses.

    This year, Samsung has boosted this program with a maximum reward amount of $1 million — its highest cash incentive yet for those who are able to identify the most severe attack scenarios within Galaxy devices.

    “It’s crucial to encourage participation from the security community in identifying potential vulnerabilities,” said Choi. “Especially in a world where cyberattacks are increasingly intelligent and disruptive.”

    All of this goes hand in hand with Samsung’s longstanding model of collaboration with hundreds of partners including carriers, service providers, chipset vendors and more. While regularly working with these partners as well as the wider community to identify threats and develop patches, Samsung Project Infinity ensures Samsung proactively takes initiative and responsibility for reinforcing its own areas of weakness.

    “Just because we have internal specialists, this doesn’t mean we don’t work with others,” added Choi. “Having more eyes gives us a better chance at spotting any vulnerabilities and helps us keep users safe.”

    So, are you still ignoring that notification now that you know it is from a team deeply committed to your security? Each of those notifications represents Samsung’s ongoing effort in keeping your data safe.

    The next time you see an update, don’t hesitate. Hit “install” and continue your online journey with peace of mind, knowing that there’s a whole team looking out for you.

    1 Timing and availability of security maintenance releases for Samsung Galaxy devices may vary by market, network provider and/or model.
    2 Statista Market Insight, “Cybercrime Expected To Skyrocket in Coming Years,” Chart: Cybercrime Expected To Skyrocket in Coming Yea
    Beginning with the Galaxy S24 series, Samsung has been offering up to seven years of mobile security updates.1 As one of the longest periods of security support available for mobile devices, these updates mean customers can safely use their phones for longer.

    This peace of mind is important when navigating our hyperconnected age as cyber threats become more common than you think and are often undetectable until too late. The global cost of cybercrime is expected to surge in the next four years, rising from $9.22 trillion in 2024 to $13.82 trillion by 2028.2 Therefore, it is critical to use a device that benefits from an ecosystem of protective measures — such as security updates.

    But where do these updates come from, and why do they pop up on your phone so regularly? Deep at the heart of Samsung’s Mobile eXperience Business lies Samsung Project Infinity, a classified operation. Samsung Newsroom met the specialist units within Samsung Project Infinity who safeguard Galaxy devices and users around the clock.

    Deep Diving for Unknown Dangers

    The Cyber Threat Intelligence (CTI) taskforce is a reconnaissance unit within Samsung Project Infinity along with the Red (RED), Blue (BLUE) and Purple (PURPLE) Teams that go beyond lab conditions to identify real-world dangers. RED and BLUE perform proactive attack and defense functions, seeking out vulnerabilities and taking measures against them. PURPLE is a special operations unit that acts as both a sword and shield for specific critical areas. These teams are strategically deployed in various countries all over the world including Vietnam, Poland, Ukraine and Brazil.

    They work covertly. The only time you’ll ever feel their presence is when you get an update containing a security patch.

    CTI is dedicated to identifying potential threats and stopping hackers from taking control of your device by staying on top of the latest risks. They work to prevent malicious actions, address threats involving the trade of stolen information and ensure your smartphone or tablet stays securely under your control.

    The taskforce protects Galaxy’s internal infrastructure — safeguarding customer data and employee information such as access credentials — since any confidential information stolen by a hacker could be sold or abused for further attacks.

    To identify potential threats and deploy countermeasures, CTI regularly explores the Deep Web and the Dark Web — bustling markets for security exploits, spyware, malware, ransomware, illicit tools and confidential corporate and customer information.

    Justin Choi, Vice President and Head of the Security Team, Mobile eXperience Business at Samsung Electronics, leads CTI. With over 20 years of experience in the U.S. tech industry as a cybersecurity authority and ethical hacker, Choi has collaborated globally to fortify security for major financial and tech firms. His expertise in identifying and mitigating zero-day threats drives the development of advanced security measures that protect over a billion Galaxy users around the world.

    “Occasionally, we engage in security research by simulating real-world transactions,” said Choi. “We closely monitor forums and marketplaces for mentions of zero-day or N-day exploits targeting Galaxy devices, as well as any leaked intelligence that could potentially serve as an entry point for system infiltration.”

    As an ethical or “white hat” hacker — whose deep understanding of hacking helps to identify and address vulnerabilities — Choi explained that any hint of suspicious behavior within the system is swiftly traced to its origin.

    For example, request for excessive privileges, unexpected behavior, and network traffic with unknown servers could point to a potential breach, at which point CTI traces Indicators of Compromise to identify the threat actors and the purpose of the attacks.

    “Once we spot these kinds of threats, we collaborate with developers and operators to lock everything down for preventing attacks,” said Ranger, a CTI member. (Samsung Project Infinity staff protect their identities with aliases to avoid being personally targeted by hackers.) “We even communicate with other departments and partners on private channels to avoid taking any chances.”

    CTI also studies threat actors to decipher their behavioral patterns. Understanding their motivations and objectives can help reveal their attack methods and provide insights for fortification.

    “Sometimes, an attack is financially or politically motivated,” added Tower, another CTI member. “Sometimes, they just like to show off.”

    Eliminating Threats Before They Become Real

    While real-time threat detection is crucial, a robust offensive security policy is equally vital. RED and BLUE are inspired by military practices in which a red team simulates enemy attacks and a blue team creates defenses to ensure safety in the face of ever-changing threats. In Samsung’s approach, RED simulates hacker attacks and designs new attack scenarios to identify potential vulnerabilities, whereas BLUE develops and implements patches to protect against them.

    Specializing in combating zero-day attacks, the teams address vulnerabilities before they can be exploited to prevent unauthorized access or data breaches. One notable data breach is the Pegasus incident in 2020 that left an operating system vulnerable.

    The RED taskforce initiates their project by investigating Galaxy devices. They continuously use and analyze new features in Galaxy and delve into recently disclosed vulnerabilities, while envisioning potential security threats against users. By conducting diverse research, once they select a target that presents any potential risks to actual Galaxy users, the RED taskforce begins their quest to detect 0-day vulnerabilities in the target.

    “One thing we do is fuzzing,” said Arrowhead, a RED member. “That throws all kinds of unexpected data at software to uncover any hidden flaws.”

    Other methods such as code auditing as well as static and dynamic analyses help develop a comprehensive understanding of a system’s health and safety. The team contextualizes each threat in everyday scenarios to prevent threats to Galaxy devices.

    “It’s not so urgent if there’s a flaw with the alarm clock, but a glitch in location data could lead to somebody being unknowingly followed through their device,” added Gate, a BLUE member. “Once we discover a hypothetical weakness, we hurry to patch it and roll out an update to the relevant models.”

    The Specialists Among Specialists

    PURPLE acts as both aggressor and protector to ensure the security of critical areas, the key features of Galaxy devices. As the name suggests, PURPLE combines elements of RED and BLUE’s skillsets — however, an extra in-depth knowledge of the security measures built into the mobile devices sets this team apart.

    “Samsung collaborates with external security researchers to uncover vulnerabilities, but our own intimate knowledge of Galaxy systems allows for more effective targeting of potential weak spots,” said Sphinx, a PURPLE member.

    “The better you know a system, the better you can protect it,” added Oracle, another PURPLE member.

    Occasionally, PURPLE is called upon to address issues nobody else can including formulating new security requirements, designs and features. Though, it isn’t just about keeping Galaxy devices and the Samsung Knox security platform in good shape. Samsung also advises and proposes solutions to chipset and network vendors depending on their requirements.

    Samsung’s position as a hardware leader means the company can not only scale its security innovations but also cover its secure supply chain. In this way, Galaxy is contributing to the security of next generation of chips.

    Perhaps surprisingly, the motivation behind this work sometimes has nothing to do with technology. PURPLE members perform with a sense of duty to keep people safe, and they feel a certain pride and satisfaction in finding and addressing vulnerabilities.

    “It’s not just me but also my family and friends who use Galaxy,” continued Oracle. “So, let’s make it safe!”

    The bar for entry is high, and technical skills alone are not enough. To join the team, one must also demonstrate strength of character since any vulnerabilities discovered by the team could be very profitable in the wrong hands.

    “They must be tenacious and moral,” said Choi. “One must be responsible and put users before their personal interests.”

    “Being an early adopter and a big reader of tech trends is also useful,” added Sphinx.

    A System of Safeguards

    CTI, RED, BLUE and PURPLE are critical components of Galaxy’s security strategy — but Samsung Project Infinity juggles many initiatives including the Samsung Mobile Security Rewards Program which works with the wider security community to further scrutinize Galaxy’s defenses.

    This year, Samsung has boosted this program with a maximum reward amount of $1 million — its highest cash incentive yet for those who are able to identify the most severe attack scenarios within Galaxy devices.

    “It’s crucial to encourage participation from the security community in identifying potential vulnerabilities,” said Choi. “Especially in a world where cyberattacks are increasingly intelligent and disruptive.”

    All of this goes hand in hand with Samsung’s longstanding model of collaboration with hundreds of partners including carriers, service providers, chipset vendors and more. While regularly working with these partners as well as the wider community to identify threats and develop patches, Samsung Project Infinity ensures Samsung proactively takes initiative and responsibility for reinforcing its own areas of weakness.

    “Just because we have internal specialists, this doesn’t mean we don’t work with others,” added Choi. “Having more eyes gives us a better chance at spotting any vulnerabilities and helps us keep users safe.”

    So, are you still ignoring that notification now that you know it is from a team deeply committed to your security? Each of those notifications represents Samsung’s ongoing effort in keeping your data safe.

    The next time you see an update, don’t hesitate. Hit “install” and continue your online journey with peace of mind, knowing that there’s a whole team looking out for you.

    1 Timing and availability of security maintenance releases for Samsung Galaxy devices may vary by market, network provider and/or model.
    2 Statista Market Insight, “Cybercrime Expected To Skyrocket in Coming Years,” Chart: Cybercrime Expected To Skyrocket in Coming Yea

  • Samsung Art Store Unveils First-Ever Art Basel Collection, Bringing Premier Gallery Works Into Homes Worldwide

    Samsung Art Store Unveils First-Ever Art Basel Collection, Bringing Premier Gallery Works Into Homes Worldwide

    Samsung is expanding its partnership with Art Basel to Art Basel Miami Beach. Following the debut as Art Basel’s first-ever Official Visual Display partner in Basel, Switzerland earlier this year, complete with an immersive Collectors Lounge experience. Through this unique partnership, Samsung is also launching a new initiative with Art Basel to bring curated collections of contemporary artworks from Art Basel’s renowned exhibiting galleries exclusively to the Samsung Art Store. A new collection will be shared once a quarter with the first collection launching today.

    The Samsung Art Store is available on The Frame, the best-selling lifestyle TV from Samsung that doubles as a piece of art. Subscribers around the world can experience gallery highlights from Art Basel, which joins other renowned collections such as those from The Metropolitan Museum of ArtThe Museum of Modern Art and The Musée d’Orsay available on the Samsung Art Store. The latest partnership with Art Basel underscores Samsung’s commitment to making world-class art accessible to anyone with The Frame through its innovative platform. 

    Art Basel Miami Beach is the premier global art fair of the Americas with cultural significance attracting thousands of art enthusiasts every year. For the first time, this exclusive experience is being delivered directly to the screens of millions of people through The Frame.

    Ahead of Art Basel Miami Beach, Samsung Art Store subscribers will have access to a curated collection of 15+ select works from Art Basel’s galleries, some of which will be displayed at the highly anticipated fair, taking place from December 6-8, 2024 at the Miami Beach Convention Center. The collection features pieces from international contemporary galleries, including James Cohan, Kasmin, moniquemeloche, mor charpentier, Nara Roesler, Roberts Projects and Tina Kim, offering subscribers a unique, front-row look at some of Art Basel’s incredible works of art.

    ▲ Candida Alvarez’s Mostly Clear (detail) (2023) shown on The Frame by Samsung. Photo: Samsung

    Founded in 1970 by gallerists from Basel, Art Basel is the world’s premier art fair for modern and contemporary art. This year in Miami Beach, Art Basel will bring together 286 leading international galleries from 38 countries to present artworks of the highest quality across all media — from painting and sculpture to photography and digital works. Art Basel will once again reaffirm its unparalleled position as a platform for discovery and encounters that drive the art world.

    “Art Basel’s mission is to power the world of art by connecting leading artists and galleries with art loving audiences,” said Noah Horowitz, CEO of Art Basel. “Our collaboration with Samsung allows us to extend that reach like never before by broadening access to leading galleries and significant works from established artists to a new generation of emerging talents.”

    Yong Su Kim, EVP and Global Head of Video Services and Partnerships at Samsung, echoed the excitement surrounding this partnership. “Art Basel represents the pinnacle of contemporary art, and we are thrilled to amplify that experience with leading display technology that brings art to millions of people,” Kim said. “Through the Samsung Art Store and the lifelike visuals of The Frame, we are making it possible for anyone to experience Art Basel and take part in an iconic cultural moment.”

    Samsung Art Store Collectors Lounge To Feature Industry Panels, Interactive Activation and More

    As the Official Display Partner of Art Basel Miami Beach, Samsung is hosting a dedicated Samsung Art Store Collectors Lounge from December 4-8 under the concept, “Bringing Art Home,” where attendees can enjoy remarkable artworks on The Frame’s museum-worthy display. In addition, visitors will see The Frame showcased with unique bezels in various colors and designs from DecoTVFrames, an official Samsung partner exclusively available for The Frame.

    The Frame will also be installed throughout the fair to present visitors with a variety of vivid screen experiences.

    In addition to its dynamic Collectors Lounge experience, Samsung is hosting a series of panel discussions featuring influential voices from the contemporary art world. These sessions include:

    • Celebrating Women in Art and Technology — Innovation and Expression
      An engaging panel led by Daria Greene, Head of Global Curation at Samsung. This discussion celebrates the journey of female artists and innovators who are redefining the intersection of art and technology. Gain insights into how digital platforms are amplifying voices and breaking new ground in contemporary art.
    • The Future of Digital Art — Innovation, Rights and Connectivity
      Explore the future of digital art in this thought-provoking panel, moderated by Maya Harris, Head of Business Development and Strategic Partnerships at Samsung. This session delves into how technology is reshaping artistic rights, accessibility and the ways institutions and artists connect with global audiences.

    As the home for Samsung Art Store, The Frame has been refreshed in 2024 to deliver an even more complete artistic and aesthetic experience. That includes Pantone Validated ArtfulColor Certification,1 the industry leading color experts. The Frame is the world’s first and only art TV to achieve this validation, ensuring natural and realistic visuals that wouldn’t look out of place in a gallery. It also sports an Anti-Reflection with Matte Display, helping you limit light distractions so your artwork appears even more true-to-life. The Frame hangs just like a picture flush against the wall and is available in class sizes ranging from 32 to 85 inches.

    The Frame also delivers value-add features that you can only find from Samsung — the #1 global TV brand for 18 years and counting.2 Samsung technology makes everything you watch look clearer and crisper, while you enjoy access to 2,700+ free channels, including 400+ premium channels on Samsung TV Plus.3 You can also game without a console through Samsung Gaming Hub,4 use your TV as your smart home hub and ensure your personal data is protected by Samsung Knox security.

    1 Pantone company provides a universal language of color, called Pantone Matching System, that enables color-critical decisions through every stage of the workflow for brands and manufacturers.
    2 Source: Omdia, Jan 2024. Results are not an endorsement of Samsung. Any reliance on these results is at the third party’s own risk.
    3 Available for free on Samsung Smart TVs released after 2016, Galaxy devices, Smart Monitors, Family Hub refrigerators and the web.
    4 Available games and content may vary by country and model and are subject to change without notice. Certain games require a separate controller. Internet connection and subscription may be required. Requires a Samsung account.