Many Android Vulnerabilities Can Be Traced To Manufacturer Modifications
Computer security researchers have found that Android smartphone manufacturers are inadvertently incorporating new vulnerabilities into their products when they customize the phones before sale, according to a recent study. On average, the researchers found that 60 percent of the vulnerabilities found in the smartphone models they evaluated were due to such “vendor customizations.” A paper
NC State Research Helps Shape Yellowstone ‘Winter Use’ Plan
Editor’s Note: This is a guest post by Dr. Chris Frey, distinguished university professor of civil, construction and environmental engineering. Frey is also chair of the EPA Science Advisory Board’s Clean Air Scientific Advisory Committee. On February 22, the National Park Service released a plan to guide winter use of over snow vehicles (OSVs), including snowmobiles and
Researchers ID ‘Smishing’ Vulnerability in Android
Mobile security researchers have identified a new vulnerability in popular Android platforms, including Gingerbread, Ice Cream Sandwich and Jelly Bean. The vulnerability has been confirmed by Google, and will be addressed in a future Android release. Specifically, Xuxian Jiang’s research team at NC State has identified an SMS-phishing (“smishing”) vulnerability. If an Android user downloads
Researchers Unveil New Technique to Detect Bots in Casual Online Games
Casual online games, such as FarmVille and Fantastic Contraption, have thousands of enthusiastic followers – but the use of automated “bots” to give some players an advantage is short-changing the companies behind the games. Now researchers from NC State have developed a new technique to help companies identify these bots, and take action against them.
Clickjacking Rootkits for Android: the Next Big Threat?
Mobile security researchers have identified an aspect of Android 4.0.4 (Ice Cream Sandwich) and earlier models that clickjacking rootkits could exploit. A research team led by Xuxian Jiang at NC State has been trying to identify potential weaknesses in various smartphone platforms as part of an overall effort to stay ahead of attacks from “black