{"id":1422,"date":"2014-08-29T20:34:44","date_gmt":"2014-08-30T03:34:44","guid":{"rendered":"http:\/\/www.awesomescienceprojects.com\/blog\/?p=1422"},"modified":"2014-08-21T22:42:21","modified_gmt":"2014-08-22T05:42:21","slug":"someone-hacked-your-smartphone","status":"publish","type":"post","link":"http:\/\/www.awesomescienceprojects.com\/blog\/?p=1422","title":{"rendered":"Someone Hacked Your Smartphone"},"content":{"rendered":"<p>Since the time Apps were invented to be downloaded onto a smartphone there has always been a very real possibility that an app could hack your phone and gain personal information. This is why making sure that an app was programmed by a trustworthy site was of paramount importance.<\/p>\n<p>Now a set of computer scientists at the University of California &#8211; Riverside have demonstrated that even a trusted app could end up compromising your smart phone. The researchers revealed a flaw in operating systems such as Android, iOS, and Windows which could allow a hacker to gain personal information from your smart phone if you have downloaded the apps for gmail, CHASE Bank and H&amp;R Block.<\/p>\n<p>The researchers were able to hack into these apps with a success rate between 82 to 92%. Surprisingly Amazon app was the most difficult to hack with a success rate of 48%. The <a href=\"http:\/\/ezinearticles.com\/?Science-Fair-Projects---Complete-Guide-to-a-Winning-Science-Project-Step-3---Project-Research&amp;id=1784161\">science project<\/a> began because the researchers felt that there was an unparallelled security risk thanks to the many apps that were being developed by so many different developers the world over<\/p>\n<p>Having proved that any app can be hacked the researchers are now working on reducing the risk that apps provide to a smartphone. Anything that makes the smart phone date more difficult to hack will be well worth waiting for.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since the time Apps were invented to be downloaded onto a smartphone there has always been a very real possibility that an app could hack your phone and gain personal information. This is why making sure that an app was programmed by a trustworthy site was of paramount importance. Now a set of computer scientists [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1422","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1422"}],"version-history":[{"count":1,"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1422\/revisions"}],"predecessor-version":[{"id":1423,"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1422\/revisions\/1423"}],"wp:attachment":[{"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1422"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.awesomescienceprojects.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}