2 cell phones in 1
2011-10-10
(Press-News.org) The company smartphone, the private cellphone, keys for house and car, wallet – the objects we carry around with us every day are becoming more numerous all the time. Which is why many people also use their business smartphone for personal purposes. It may be convenient, but employees and the IT department have different interests: most employees would prefer unlimited use of their smartphones, installing and using whatever programs they like. But this can also open the door to hackers in search of ways of attacking. As a result, IT departments often try to limit the use of smartphones accordingly. Security experts at the Fraunhofer Institute for Secure Information Technology SIT and at the Center for Advanced Security Research Darmstadt CASED have now developed a security solution for Android-based smartphones: „BizzTrust for Android". The solution separates private and business applications on the phone itself.
BizzTrust smartphones offer two protected areas for data and apps. They can identify whether content belongs to a business or a private application, store it separately in the appropriate partition and control access to the data during operation. This enhances the security of business data while still allowing employees to install as many private apps as they wish. Even if attackers manage to infiltrate an unsecured app, they cannot use it to access company data, and the impact of the attack is confined to the private data on the smartphone. „Our development significantly improves the security of today's mobile terminals at no cost to user-friendliness," notes Prof. Dr. Ahmad-Reza Sadeghi, director of Cyber-Physical Systems Security at the SIT/CASED.
A color symbol shown in the display let the user know at all times whether he or she is in the business or „red" area or in the personal, „green" area of the smartphone. Two „clicks" of the touchscreen is all it takes to toggle over to the respective other side.
To implement these two virtual smartphones in a single device, the experts modified the Android operating system so that all data from trustworthy applications is marked as such. The company itself decides which applications are released for business use, and who has access to what areas of company IT. Because these rules may change over time, the business applications are updated or deleted as needed as soon as the user links to the company network. There is another benefit as well: companies can provide their own apps to employees and keep them updated on a regular basis. Security is guaranteed at all times as well: the telephone's software is checked before the telephone can log onto the company's network via a secure VPN link. If a modification is detected critical applications can be blocked.
Researchers will present the BizzTrust for Android at the it-sa trade fair. The next step for this technology is to equip smartphones with integrated smartcards that provide additional security functions. To supplement BizzTrust, researchers at SIT are now teaming up with partner companies to develop tools to permit IT administrators to manage smartphones on an everyday basis – the technology would establish a secure link with the mobile device for wirelessly synchronization and backup of the data stored there – or data deletion if the device is lost or stolen.
INFORMATION:
END
ELSE PRESS RELEASES FROM THIS DATE:
2011-10-10
The farmer casts a worried gaze at his potato field: where only recently a lush green field of plants was growing, much of the foliage has now turned brown – presumably the result of a fungal disease. Usually, by the time the disease becomes visible, it is already too late. The course of the disease is then so advanced that there is little the farmer can do to counteract the damage done. To determine early on whether and how severely his plants are diseased, he would have to submit samples to a laboratory on a regular basis. There, researchers usually employ the ELISA method, ...
2011-10-10
It is 7:30 a.m. and high time she left the house; she mustn't be late for her 8 o'clock appointment. But the young lady still feels the need to check that she closed all her windows, because the forecast is for thunderstorms that afternoon. Later, in the car, she realizes that she forgot to check one of the rooms when she went round the house. In situations like this, window contacts can make life easier and give peace of mind. These little electronic helpers are fitted onto window handles, and they can tell from the position of the handle whether the window is wide open, ...
2011-10-10
Many of you might know that Congenital Dyserythropoietic Anemia type II (CDA II) is a rare blood disorder, due to a failure in final part of erythropoiesis. What will surprise you is the fact that some mutations responsible for the disease can be tracked 3.000 years back. A study led by the ENERCA member Prof. Achille Iolascon, from CEINGE Advanced Biotechnologies (Naples, Italy) and the University of Naples Federico II, analyzes two mutations (E109K and R14W) of the SEC23B gene and discovers one of them is responsible for the higher frequency of CDA II in Italian population. ...
2011-10-10
A new University of Guelph study shows that gray jays hoping to survive and reproduce through Canada's harsh winters need to be able to store food in the right kinds of trees.
The study appears in Oecologia and was co-authored by Prof. Ryan Norris, Department of Integrative Biology; Brian Kielstra, an undergraduate student in the Department of Geography; and Dan Strickland, retired chief naturalist of Algonquin Park in Ontario.
Unlike most birds that migrate for winter, gray jays are year-round residents in the Canadian boreal forest. In winter, they rely on berries, ...
2011-10-10
Contrary to the traditional views of the music industry, removal of digital rights management (DRM) restrictions can actually decrease piracy, according to new research from Rice University and Duke University.
Marketing professors Dinah Vernik of Rice and Devavrat Purohit and Preyas Desai of Duke used analytical modeling to examine how piracy is influenced by the presence or absence of DRM restrictions. They found that while these restrictions make piracy more costly and difficult, the restrictions also have a negative impact on legal users who have no intention of ...
2011-10-10
Parents of young caffeine consumers take heed: that high-calorie energy drink or soda might present more than just obesity risk. In fact, according to a double-blind, placebo-controlled study that examined responses to stimulants, an individual's subjective response to caffeine may predict how he or she will respond to other stimulant drugs, possibly reflecting differences in risk for abuse of other more serious drugs of abuse, such as amphetamine and cocaine.
The new findings are reported in the November issue of the journal Drug and Alcohol Dependence by Stacey Sigmon, ...
2011-10-10
AMHERST, Mass. – Using one of the most sensitive neutrino detectors on the planet, an international team including physicists Laura Cadonati and Andrea Pocar at the University of Massachusetts Amherst are now measuring the flow of solar neutrinos reaching earth more precisely than ever before. The detector probes matter at the most fundamental level and provides a powerful tool for directly observing the sun's composition.
Pocar, Cadonati and colleagues report in the current issue of Physical Review Letters that the Borexino instrument has now measured with high precision ...
2011-10-10
Monaco Yacht Show 2011 marked the end of the summer season in the Mediterranean, and charter yachts are readying to head towards warmer climates. Second in size only to the combined charter grounds of the Eastern and Western Mediterranean, the Caribbean and the Bahamas offer over 10,000 islands, islets, reefs and cays cruising.
Luxury charter yachts in the Caribbean -
M/Y Seven Sins - launched in 2005, Seven Sins has a proven charter record for delivering excellence at sea. Cherry wood has been chosen to give the interior a warm and welcoming feel whilst Indonesian ...
2011-10-10
For immediate release – October 7, 2011 – (Toronto) – A new study from the Centre for Addiction and Mental Health has found evidence that a specific gene is linked to suicidal behaviour, adding to our knowledge of the many complex causes of suicide. This research may help doctors one day target the gene in prevention efforts.
In the past, studies have implicated the gene for brain-derived neurotrophic factor (BDNF) in suicidal behaviour. BDNF is involved in the development of the nervous system.
After pooling results from 11 previous studies and adding their own study ...
2011-10-10
Friday, October 7, 2011, Cleveland: Researchers have discovered a cellular pathway that promotes inflammation in diseases like asthma, rheumatoid arthritis, psoriasis, inflammatory bowel disease, and multiple sclerosis. Understanding the details of this pathway may provide opportunities for tailored treatments of inflammatory and autoimmune diseases.
Discovery of this pathway was the work of an active collaboration between Xiaoxia Li, Ph.D., and Thomas Hamilton, Ph.D., Department Chair, both of the Department of Immunology at Lerner Research Institute of Cleveland Clinic. ...
LAST 30 PRESS RELEASES:
[Press-News.org] 2 cell phones in 1