text-only page produced automatically by LIFT Text Transcoder Skip all navigation and go to page contentSkip top navigation and go to directorate navigationSkip top navigation and go to page navigation
National Science Foundation
News
design element
News
News From the Field
For the News Media
Special Reports
Research Overviews
NSF-Wide Investments
Speeches & Lectures
NSF Current Newsletter
Multimedia Gallery
News Archive
News by Research Area
Arctic & Antarctic
Astronomy & Space
Biology
Chemistry & Materials
Computing
Earth & Environment
Education
Engineering
Mathematics
Nanoscience
People & Society
Physics
 

Email this pagePrint this page
All Images


Press Release 10-052
Can Clever Hackers Target Smart Phones?

Two computer scientists explored how smart phones can be hacked, hijacked and exploited without their owner’s knowledge

Back to article | Note about images

Artists interpretation of a hacker using a smart phone to surveil someone or drain its battery

Smart phones are becoming a common part of everyday life, but the same capabilities that make them so useful offer opportunities for hackers.

Credit: Zina Deretsky, National Science Foundation


Download the high-resolution JPG version of the image. (421 KB)

Use your mouse to right-click (Mac users may need to Ctrl-click) the link above and choose the option that will save the file or target to your computer.

Smart phones are becoming a common part of everyday life. Millions of Americans are using these powerful devices whose impressive capabilities and features rival that of desktop computers from just a few years ago. Yet few users realize that these same devices can be hacked and turned against their owners. Vinod Ganapathy and Liviu Iftode, two researchers from Rutgers University, described the results of their attempts to hack and hijack smart phones in this online media briefing.

Credit: National Science Foundation/Rutgers University

 



Email this pagePrint this page
Back to Top of page