Showing posts with label Smartphones. Show all posts
Showing posts with label Smartphones. Show all posts

Wednesday, April 13

Privacy mode helps secure Android smartphones

Ultimate Zip Cracker Software Download

ScienceDaily (13 month 2011) researchers at the University of North Carolina have developed software that helps prevent their personal information stolen by hackers smartphone Android.

"There are lots of concerns potential leaks of personal information from smartphones," says Dr. Xuxian Jiang, an Assistant Professor of computer science at NC State and co-author of paper describing the research. "We have developed software that creates a privacy mode for Android, give users a flexible control over what personal information is available for various applications." software application called privacy Smartphone steal information and Taming (TISSA).

TISSA works by creating a private Administrator setting that allows users to customize the level of information ????? access to all Smartphone application. These settings can be changed whenever the relevant applications that have been executed – not only when the applications are not installed.

The prototype of TISSA has four possible privacy settings for each application. These settings are trusted, Anonymized, Bogus, empty. If an application is trusted, TISSA does not impose restrictions on access to additional information. If the user chooses Anonymized, TISSA provides the application with a built-in information that allows the application to run, without providing access to detailed personal information. Artificial setting provides an application with fake results asking for personal information. An empty setting responds to requests of information by saying relevant information does not exist or is not available.

Jiang said it was easy to integrate TISSA change more settings to allow more fine-grained control of access to personal information. "These settings may be even more specialized for different types of information, such as a list of your contacts or position," said Jiang. "Settings can also be specialized for different applications."

For example, a user can install a weather application that requires location data to provide the user with the local weather forecast. Instead of telling the application exactly where is the user, can be programmed to TISSA was a built-in application data — such as random location within a 10-mile section of the user. This will allow an application to provide weather information, local weather, but will ensure that the application could not be used to track the movements of the user.

Researchers are now exploring how to make the software available for Android users. "Relatively minor software change," Jiang said, "and it can combine with the over-the-air update."

The paper, "Taming information-stealing applications Smartphone (bandroaid), was a surgeon by Jiang; Yajin Zhou 's, ph d student. On the NC State; Dr. Vincent Freeh, a Professor of computer science at NC State; And Dr. Zhang's Research Center, Xinwen of Huawei America. The paper will be presented at the Fourth International Conference, trusted computing, in Pittsburgh, finances and research supported by the National Science Foundation, NC State secure open systems initiative, which receives funding from the research of the United States Army.

Email or share this story:


The source of the story:

The above story is published (with writers adaptations by a teamdaily science) materials provided by University of North Carolina.

Note: If no source is cited, instead.

Disclaimer: hdioth in this article do not necessarily reflect those of his team or ScienceDaily.

Ultimate Zip Cracker Software Download

Monday, April 4

Smartphones: providing seamless, secure exchange of data between multiple platforms

Ultimate Zip Cracker Software Download

ApplicationsScienceDaily (Mar. 2011) with the Smartphone market of today. In the future, Web-capable TVs, desktop computers and tablet PCs, and cars will run all the apps, which helps, for example, a program and a ski trip.

To enable Web applications bbarba networks, the project consortium webinos creates a full open source code base. Tagerted technology allows different devices and applications work together seamlessly, securely and interoperably. Most recentely, the Consortium is the first research results are summarized in reports four cover use cases, security, technical and industrial requirments.

Webinos from one of the major project to companies, research institutions, including the Fraunhofer FOKUS, Technische Universität München, University of Oxford with electronics companies such as Sony Ericsson, Samsung, carmaker BMW regulatory body like the W3C Deutsche Telecom operators. Webinos is sponsored by the 10 million euro grant from the European Union.

"The result of the webinos project is an open source platform that enables the secure exchange of data between multiple devices and services," explains Dr. Stephan Steglich, leader of the Consortium on the Fraunhofer FOKUS. The tools provided through the platform will allow software designers to create Web applications in any industry, and services that can be used, or common to a broad spectrum of integrated and connected devices-regardless of the hardware specifications for their operating systems.

New business opportunities

"It is already clear that for new business models and opportunities are endless, especially because the target platform for interactive webinos project and software developers and applications to design innovative applications, personalised and safer," says Dr. Nick Allott, technical coordinator of webinos and founder of NquiringMinds Inc. technology allows Web applications to access at the same time batlooizia, Your computer, your passwords or games or music player.

"Small and medium-sized enterprises also benefit from bright and low foot in the door ' of the world of applications," adds Dr. Steglich. "They don't need to go to the expense of purchasing or developing the software themselves if they want to adapt services to a wide variety of stations".

Secure Web experience

Privacy and security considerations are at the heart of webinos. It enables useful without hindrance, but only with user permission. Embedded in the open source platform features put sensitive data and functions under the user's explicit, not to remain on the questionable reliability of cloud. "Security and privacy user expectations" covered by one of the published reports.

Webinos developed platform is still in the design, with the first prototype is expected to be completed by the end of 2011. Webinos Consortium welcomes input into the development of the platform. For more information, visit: www.webinos.org

Email or share this story:


The source of the story:

The above story is published (with writers adaptations by a teamdaily science) materials provided by the Fraunhofer-Gesellschaft,, via AlphaGalileo.

Note: If no source is cited, instead.

Disclaimer: hdioth in this article do not necessarily reflect those of his team or ScienceDaily.

Ultimate Zip Cracker Software Download