text-only page produced automatically by LIFT Text Transcoder Skip all navigation and go to page contentSkip top navigation and go to directorate navigationSkip top navigation and go to page navigation
National Science Foundation Home National Science Foundation - Computer & Information Science & Engineering (CISE)
Computing and Communication Foundations (CCF)
design element
CCF Home
About CCF
Funding Opportunities
Awards
News
Events
Discoveries
Publications
Career Opportunities
View CCF Staff
CISE Organizations
Advanced Cyberinfrastructure (ACI)
Computing and Communication Foundations (CCF)
Computer and Network Systems (CNS)
Information & Intelligent Systems (IIS)
Proposals and Awards
Proposal and Award Policies and Procedures Guide
  Introduction
Proposal Preparation and Submission
bullet Grant Proposal Guide
  bullet Grants.gov Application Guide
Award and Administration
bullet Award and Administration Guide
Award Conditions
Other Types of Proposals
Merit Review
NSF Outreach
Policy Office
Other Site Features
Special Reports
Research Overviews
Multimedia Gallery
Classroom Resources
NSF-Wide Investments

Email this pagePrint this page
All Images


Press Release 10-052
Can Clever Hackers Target Smart Phones?

Two computer scientists explored how smart phones can be hacked, hijacked and exploited without their owner’s knowledge

Back to article | Note about images

Artists interpretation of a hacker using a smart phone to surveil someone or drain its battery

Smart phones are becoming a common part of everyday life, but the same capabilities that make them so useful offer opportunities for hackers.

Credit: Zina Deretsky, National Science Foundation


Download the high-resolution JPG version of the image. (421 KB)

Use your mouse to right-click (Mac users may need to Ctrl-click) the link above and choose the option that will save the file or target to your computer.

Smart phones are becoming a common part of everyday life. Millions of Americans are using these powerful devices whose impressive capabilities and features rival that of desktop computers from just a few years ago. Yet few users realize that these same devices can be hacked and turned against their owners. Vinod Ganapathy and Liviu Iftode, two researchers from Rutgers University, described the results of their attempts to hack and hijack smart phones in this online media briefing.

Credit: National Science Foundation/Rutgers University

 



Email this pagePrint this page
Back to Top of page