123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Information Security Researchers Reveal Vulnerability In Android 2.3

Profile Picture
By Author: Peter Martin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Several security research reports have cautioned users against increased attack on Mobile phones and applications during this year. Recently, security researchers at North Carolina State University (NCSU) discovered vulnerability in Android 2.3 (Gingerbread). The identified vulnerability in the latest version of the mobile operating system causes attackers to gain unauthorized access to files and documents on the microSD card (storage card) in the mobile phone.

The vulnerability has been identified by a team of information security professionals led by Xuxian Jiang, an assistant professor in the University's computer science department.

The recently release Gingerbread version comes with improved features over the earlier version Froyo. The new version comes with features such an improved on-screen key board and better user interface. Gingerbread is a minor version and may be replaced with Android 3.0 (Honeycomb) during the course of this year.

Usually, software developers use ethical hacking ...
... to ascertain security flaws. In this case, researchers identified the vulnerability by testing a Nexus S device installed with Gingerbread. The researchers launched attacks on the operating system through a proof-of-concept exploit code.
Fortunately, the purpose of the exploit was to alert developers on the security flaw in the operating system. Attackers may exploit the vulnerability by alluring users to click a fake and malicious link. When unsuspecting users click on the link, the malicious code is executed on their phones. By exploiting the vulnerability attackers may acquire list of applications installed on the mobile device. The executed malicious code may allow attackers to open, view and upload files, photos, voicemails and applications stored in the microSD card partitions to a remote server. Therefore, the attack poses information security risk for users of Nexus S. The extracted information may be misused by the attackers to indulge in identity theft, fraud, blackmail and other forms of cybercrime.

Google, the vendor of product has not yet issued any patch for the vulnerability. Earlier patches were issued for similar vulnerabilities in the previous versions of Android. The current vulnerability may be fixed in the newer versions or during the release of the next major version Honeycomb.

Security professionals have advised users of Nexus S to disable Javascript or install a different web browser such as firefox to safeguard sensitive personal information.

Total Views: 312Word Count: 373See All articles From Author

Add Comment

Computers Articles

1. Loan Lending Apps: Simple Loans For Busy Lives
Author: davidbeckam

2. Top Features Of Supplier Management Software And Supplier Portal Software
Author: sneha

3. How Health & Wellness Brands Are Using Whatsapp For Better Client Retention
Author: Connverz

4. Top Benefits Of Cloud-based Erp Solutions For Growing Enterprises
Author: sneha

5. Top 5 Sop Challenges And Data-backed Ways To Solve Them
Author: Alice White

6. How Can Grocery Api Data Scraping Help You Navigate Swiggy And Instamart Data?
Author: Mobile App Scraping

7. Etmf In The Era Of Digital Trials: Challenges, Innovations, And Opportunities
Author: Giselle Bates

8. Leverage Real-time Offer Intelligence For Food Delivery Apps
Author: Food Data Scrape

9. Top 10 Features To Look For In Sales Order Management Software In 2025
Author: sneha

10. 最佳且超棒的站群服务器
Author: 8U Cloud

11. How Cyber Ab Marketplace Supports C3pao And Cmmc Provisional Assessor
Author: Ariento Inc

12. Top 10 Benefits Of It Consulting Services For Your Business!
Author: GIGABITTechnologies

13. Unlocking App Success: Aso App Store Optimization In Bangaloreq
Author: Cubikeymedia

14. Looking For A Tableau Replacement? Try Helical Insight – Open Source Bi Tool
Author: Vhelical

15. Accidentally Deleted Files From Your Hard Drive? Here’s What To Do Next
Author: f2.technology

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: