Samsung Mobile Security
Cookie Policy

Updated on Jan 17, 2022

This Cookie Policy describes the different types of cookies that may be used in connection with Samsung Mobile Security website which is owned and controlled by Samsung Electronics Co., Ltd (“Samsung Electronics”). This Cookie Policy also describes how you can manage cookies.

It’s important that you check back often for updates to the Policy as we may change it from time to time to reflect changes to our use of cookies. Please check the date at the top of this page to see when this Policy was last revised. Any changes to this Policy will become effective when we make the revised Policy available on our website.

Samsung Electronics has offices across Europe, so we can ensure that your request or query will be handled by the data protection team based in your region. If you have any questions, the easiest way to contact us is through our Privacy Support Page at

You can also contact us at:

European Data Protection Officer
Samsung Electronics (UK) Limited
Samsung House, 2000 Hillswood Drive, Chertsey, Surrey KT16 0RS


Cookies are small files that store information on your computer, TV, mobile phone, or other device. They enable the entity that put the cookie on your device to recognize you across different websites, services, devices, and/or browsing sessions.

We use the following types of cookies on this website:

Essential Cookies: enable you to receive the services you request via our website. Without these cookies, services that you have asked for cannot be provided. For example, these enable to identify users and provide proper service for each user. These cookies are automatically enabled and cannot be turned off because they are essential to enable you to browse our website. Without these cookies this Samsung Mobile Security website could not be provided.

Cookie Domain Purpose
JSESSIONID to keep login session
lastActivityTime to save the user's last activity time to automatically logout after 30 minutes of inactivity

Managing Cookies and Other Technologies

You can also update your browser settings at any time, if you want to remove or block cookies from your device (consult your browser's "help" menu to learn how to remove or block cookies). Samsung Electronics is not responsible for your browser settings. You can find good and simple instructions on how to manage cookies on the different types of web browsers at

Go straight to the menu Go straight to the text

Security Reporting

  • Our dedicated security analysts will work with you throughout the process from the point you submit a security vulnerability report through the ticketing system. Our priority is to make sure we address security issues as soon as possible while communicating with you and rewarding you as an appreciation.
  • We encourage the reporting party to place the users’ interest first and follow the philosophy of Responsible Disclosure, which involves privately notifying us of any security vulnerabilities before disclosing them in public to allow us to resolve the vulnerabilities and minimize overall risk to users.
How the process works
  • Reporting
  • Analyzing
  • Patching
  • Publishing
  • Reward
  • Close
01. Reported

Submission of Vulnerability Report via Security Reporting Page of the ticketing system (Samsung Account required)

When we receive a report via Security Reporting in the ticketing system, the automatic reply email will be sent. If you don’t receive any response email, please check if the report is correctly registered and make sure email from is not flagged as junk email.

02. Analyzing

Internal Evaluation of Report and Severity Level based on Security Impact and Proof-of-Concept

When a security analyst is assigned for the issue, the automatic reply email will be sent. Next, the analyst will start analyzing the issue and keep communicating with you to confirm the issue if necessary.

03. Patching

Development of Relevant Security Patch and final decision of Severity Level

When the analyst completes analysis, the Samsung’s internal security team will decide severity from the analysis result on the basis of Samsung Mobile Security Risk Classification as well as internal criteria, and let you know it by email.

Also, the analyst will start working with the respective development team to prepare patches.

04. Publish

Make vulnerabilities public through posting them on this site and assign CVE IDs

Right after the patches start releasing, we publicly release the vulnerability information and acknowledge your contribution for helping us improve the security of Samsung devices and services. And we publish the CVE ID for the issue as necessary.

05. Reward

If qualified, Rewards are paid through Bugcrowd (via payment processing)

If the report is eligible for reward, we start the rewards process. To start this process, we notify you of rewards amount and request required information for payment processing. (You will be asked to provide your full name, country of residence and address, postal code, and phone number for rewards purpose.) And the information will be sent to Samsung’s designated partner Bugcrowd who will then contact you to confirm the pay-out rewards and payment method.

06. Close

Rewards payout is complete or the Report is Closed as [Duplicate/ No Security Impact/ Working as Intended/ AOSP / No information provided]

When the process is completed, we will notify the you of closing the process.