Tag Archive for: Researchers

US, German researchers create framework for core Android security modules – ZDNet


ZDNet

US, German researchers create framework for core Android security modules
ZDNet
The researchers, from North Carolina State University and Technische Universitat Darmstadt/CASED in Germany, have developed a modification to the core Android operating system called the Android Security Modules (ASM) framework. The framework …
Boffins propose security shim for AndroidRegister
Plug-and-play Android security layer outlined by NC State researchersNetwork World
Researchers build security framework for AndroidCSO Online
Gigaom –Beach Carolina Magazine
all 10 news articles »

“android security” – read more

Plug-and-play Android security layer outlined by NC State researchers – Network World


Phys.Org

Plug-and-play Android security layer outlined by NC State researchers
Network World
A modified version of Android uses a system of modularized plugins to help make sure the latest security tools make it into the hands of end users as quickly as possible. The Android Security Modules framework, as outlined in a paper from researchers
Researchers propose new Android security framework that could aid BYOD Gigaom
New framework would facilitate use of new Android security modulesPhys.Org
Researchers build security framework for AndroidCSO Online

all 6 news articles »

“android security” – read more

Many home routers supplied by ISPs can be compromised en masse, researchers say

Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn.

By gaining access to such servers, hackers or intelligence agencies could potentially compromise millions of routers and implicitly the home networks they serve, said Shahar Tal, a security researcher at Check Point Software Technologies. Tal gave a presentation Saturday at the DefCon security conference in Las Vegas.

At the core of the problem is an increasingly used protocol known as TR-069 or CWMP (customer-premises equipment wide area network management protocol) that is leveraged by technical support departments at many ISPs to remotely troubleshoot configuration problems on routers provided to customers.

To read this article in full or to leave a comment, please click here

Network World Security

Five Veni grants for CWI researchers – Centrum Wiskunde & Informatica (CWI)


Centrum Wiskunde & Informatica (CWI)

Five Veni grants for CWI researchers
Centrum Wiskunde & Informatica (CWI)
… layer that protects against flaws in widely used standards. This can counteract threat such as the forged digital signatures that were found in the Flame super malware. Xiaodong Zhuge (Scientific Computing). 'High-throughput 3D imaging for nanoscience'

flame malware – read more