123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Information Security Researchers Reveal Vulnerability In Android 2.3

Profile Picture
By Author: Peter Martin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Several security research reports have cautioned users against increased attack on Mobile phones and applications during this year. Recently, security researchers at North Carolina State University (NCSU) discovered vulnerability in Android 2.3 (Gingerbread). The identified vulnerability in the latest version of the mobile operating system causes attackers to gain unauthorized access to files and documents on the microSD card (storage card) in the mobile phone.

The vulnerability has been identified by a team of information security professionals led by Xuxian Jiang, an assistant professor in the University's computer science department.

The recently release Gingerbread version comes with improved features over the earlier version Froyo. The new version comes with features such an improved on-screen key board and better user interface. Gingerbread is a minor version and may be replaced with Android 3.0 (Honeycomb) during the course of this year.

Usually, software developers use ethical hacking ...
... to ascertain security flaws. In this case, researchers identified the vulnerability by testing a Nexus S device installed with Gingerbread. The researchers launched attacks on the operating system through a proof-of-concept exploit code.
Fortunately, the purpose of the exploit was to alert developers on the security flaw in the operating system. Attackers may exploit the vulnerability by alluring users to click a fake and malicious link. When unsuspecting users click on the link, the malicious code is executed on their phones. By exploiting the vulnerability attackers may acquire list of applications installed on the mobile device. The executed malicious code may allow attackers to open, view and upload files, photos, voicemails and applications stored in the microSD card partitions to a remote server. Therefore, the attack poses information security risk for users of Nexus S. The extracted information may be misused by the attackers to indulge in identity theft, fraud, blackmail and other forms of cybercrime.

Google, the vendor of product has not yet issued any patch for the vulnerability. Earlier patches were issued for similar vulnerabilities in the previous versions of Android. The current vulnerability may be fixed in the newer versions or during the release of the next major version Honeycomb.

Security professionals have advised users of Nexus S to disable Javascript or install a different web browser such as firefox to safeguard sensitive personal information.

Total Views: 346Word Count: 373See All articles From Author

Add Comment

Computers Articles

1. Martindale Law Firm Competitive Analysis Data For Legal Industry
Author: Den Rediant

2. The Impact Of Digital Transformation In Clinical Trials
Author: Giselle Bates

3. Blending Art, Technology, And Access: A Look At Pure Art Sketch Community And Digital Portals
Author: new aurthors

4. Full Stack Development Company Driving Mvp Success Fast
Author: Rob Stephen

5. You May Need It Consulting Services But You Are Not Aware Of It Yet
Author: Helen Johns

6. Top Pos Dealers Solutions In 2025 | Best Pos Dealers In Hyderabad
Author: pbs

7. Newegg Product Data Scraping For E-commerce Market Intelligence
Author: Den Rediant

8. Coles & Woolworths Pricing Data Scraping For Retail Strategy
Author: Den Rediant

9. Answering_services
Author: brainbell10

10. Api_security
Author: brainbell10

11. Appium
Author: brainbell10

12. Out-of-stock Prediction Using Web Scraping For Inventory Management
Author: Den Rediant

13. Restaurant Data Scraping Api To Monitor Competitors In Real Time
Author: Den Rediant

14. Adobe_xd
Author: brainbell

15. Amazon Sagemaker Services
Author: brainbell10

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: