LINE

    Text:AAAPrint
    Sci-tech

    Smartphone security hole: 'open port' backdoors: study

    1
    2017-05-15 11:23Xinhua Editor: Gu Liping ECNS App Download

    Latest study of the University of Michigan (UM) found that the "open ports" of an internet communication mechanism in mobile devices are much more vulnerable to security breaches than previously thought.

    UM researchers have analyzed 24,000 popular mobiles apps to arrive at this finding, and posted the results on the website of UM.

    The researchers found that open port backdoors could be exploited to steal private information such as contacts, security credentials and photos; to remotely control a device; to perform a denial of service attack; or to inject malicious code that could jumpstart widespread, virus-like attacks.

    They have identified 410 apps with dangerous insecurities, and 956 different individual ways those insecurities could be exploited.

    The vulnerability the researchers highlighted is most pronounced in Android apps that let users share data across devices and connect to their phones from their computers.

    The researchers found that more than half of the usage of open ports in the apps they studied is unprotected, and the unprotected nature shows a general lack of awareness of the problem.

    Investigating the fundamental causes behind this general vulnerability, the researchers found that it is exposed by popular ways open ports are used in the smartphone ecosystem, rather than poor implementation of apps.

    Open ports are integral pieces of internet infrastructure that allow computer programs to accept packets of information from remote servers. It is safe in traditional computers because computers' Internet Protocol addresses don't change.

    The researchers have identified certain steps app developers can take to mitigate the vulnerability, and reported the vulnerabilities to affected app developers.

    Smartphones also use open ports to receive certain types of information. But because of the way mobile networks are structured, phones' IP addresses can change as they move through the world. This and other factors relating to mobile architecture lead to these vulnerabilities, the researchers say.

      

    Related news

    MorePhoto

    Most popular in 24h

    MoreTop news

    MoreVideo

    News
    Politics
    Business
    Society
    Culture
    Military
    Sci-tech
    Entertainment
    Sports
    Odd
    Features
    Biz
    Economy
    Travel
    Travel News
    Travel Types
    Events
    Food
    Hotel
    Bar & Club
    Architecture
    Gallery
    Photo
    CNS Photo
    Video
    Video
    Learning Chinese
    Learn About China
    Social Chinese
    Business Chinese
    Buzz Words
    Bilingual
    Resources
    ECNS Wire
    Special Coverage
    Infographics
    Voices
    LINE
    Back to top Links | About Us | Jobs | Contact Us | Privacy Policy
    Copyright ©1999-2018 Chinanews.com. All rights reserved.
    Reproduction in whole or in part without permission is prohibited.
    主站蜘蛛池模板: 石屏县| 河北省| 澳门| 静海县| 仁怀市| 凌源市| 班戈县| 呼伦贝尔市| 吴江市| 革吉县| 香港| 兖州市| 平塘县| 荔波县| 宁晋县| 南华县| 景东| 赤水市| 遂宁市| 铅山县| 连城县| 梨树县| 连南| 绥江县| 华安县| 界首市| 巴楚县| 芦溪县| 洛川县| 万载县| 达孜县| 莱芜市| 策勒县| 寻乌县| 贵定县| 乌苏市| 平乡县| 麻城市| 乐都县| 崇文区| 宁河县|