Search Results

Many Android Vulnerabilities Can Be Traced To Manufacturer Modifications

Computer security researchers have found that Android smartphone manufacturers are inadvertently incorporating new vulnerabilities into their products when they customize the phones before sale, according to a recent study. On average, the researchers found that 60 percent of the vulnerabilities found in the smartphone models they evaluated were due to such “vendor customizations.” A paper



Read more


NC State Research Helps Shape Yellowstone ‘Winter Use’ Plan

Editor’s Note: This is a guest post by Dr. Chris Frey, distinguished university professor of civil, construction and environmental engineering. Frey is also chair of the EPA Science Advisory Board’s Clean Air Scientific Advisory Committee. On February 22, the National Park Service released a plan to guide winter use of over snow vehicles (OSVs), including snowmobiles and



Read more


Researchers ID ‘Smishing’ Vulnerability in Android

Mobile security researchers have identified a new vulnerability in popular Android platforms, including Gingerbread, Ice Cream Sandwich and Jelly Bean. The vulnerability has been confirmed by Google, and will be addressed in a future Android release. Specifically, Xuxian Jiang’s research team at NC State has identified an SMS-phishing (“smishing”) vulnerability. If an Android user downloads



Read more


Researchers Unveil New Technique to Detect Bots in Casual Online Games

Casual online games, such as FarmVille and Fantastic Contraption, have thousands of enthusiastic followers – but the use of automated “bots” to give some players an advantage is short-changing the companies behind the games. Now researchers from NC State have developed a new technique to help companies identify these bots, and take action against them.



Read more


Clickjacking Rootkits for Android: the Next Big Threat?

Mobile security researchers have identified an aspect of Android 4.0.4 (Ice Cream Sandwich) and earlier models that clickjacking rootkits could exploit. A research team led by Xuxian Jiang at NC State has been trying to identify potential weaknesses in various smartphone platforms as part of an overall effort to stay ahead of attacks from “black



Read more



Page 1 of 3123