Samsung investigating report of keylogger on its laptops
IDG News Service - Samsung Electronics is investigating allegations that some models of its R Series laptops contain keylogging software that could be used to record anything typed on the laptop computers.
Mohamed Hassan said he became aware of the issue last month, when he purchased a Samsung R525 at a Best Buy in Toronto. The laptop had keylogging software on it, which he deleted immediately. Two weeks later, Hassan decided he wanted a more powerful machine, so he returned the R525 and bought a new model -- the R540, at a local FutureShop. To his surprise, the keylogger was there too, Hassan said in an interview Wednesday.
"These were new systems. They weren't used for anything," he said. "I could give them the benefit of the doubt on the first one. But then when I got a second model, a different model from a different store, that tells me that Samsung is aware of the problem."
Hassan, an IT consultant based in Toronto, said that Samsung tech support told him: "We just put it there to find out how the computer is being used."
Samsung spokesman Jason Redmond said that his company is looking into Hassan's allegations. "We take these claims very, very seriously," he said. He had not previously heard of the problem, or heard of de Willebois Consulting, the company that makes the StarLogger software that Hassan said he found on the laptop. "We have no understanding of a relationship with this company and we have no prior knowledge of this software being on our laptops," he said.
De Willebois Consulting did not respond to messages seeking comment for this story. On its website, the company says StarLogger "is completely undetectable and starts up whenever your computer starts up. See everything being typed: emails, messages, documents, web pages, usernames, passwords, and more." The software can also capture screen images, the website says.
Hassan's allegations were published Wednesday in Network World.
If Samsung is responsible for putting the keylogger on the machines, Samsung could be in big trouble, according to Cindy Cohn, legal director for the Electronic Frontier Foundation. "They shouldn't be installing keyloggers on devices that they're selling to the general public. Even if Samsung isn't using it, you're basically setting up someone else to use it," she said.
As with Sony BMG's notorious rootkit software, discovered in 2005, if Samsung secretly installed keyloggers on customers' computers, it could lead to civil lawsuits or charges that the company is violating state consumer protection laws. "There are serious criminal offenses possible if they're actually using this device to spy on their customers, but I don't see any evidence of that," Cohn said. "This could be chalked up to poor thinking, or it could be illegal. We just need more information to be able to figure out where it is on this scale."
Keyloggers are commonly used by hackers to steal sensitive information including usernames and passwords from hacked computers, but de Willebois' website describes some legitimate uses for its software: monitoring children's Internet activity or recovering text in the event of a computer crash, for example.
IDG, the parent company of the IDG News Service, also publishes Network World.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Laptops White Papers | Webcasts