Breakthrough Discoveries around Smartphones


Beyond being the integral part of our lives, smartphones are the facet of emerging and future technology. Nowadays, the tech giants are moreover focused on the technologies surrounding smart devices than computing. The world is taking steps ahead of computing technologies and discovering newer facts and possibilities in smartphones. Plus, the world is bending towards security technologies for smart devices.

On the other hand, this transforming scenario is producing bundles of opportunities for technology industry and hence, inspiring the industry to discover and delineate new directions for future. There is a greater segment of researchers and analysts continuously working around smartphones. And, they are constantly revealing newer facts and potential developments in smart devices. Eventually, this has not only grown as an area of interest, but a proliferating region for business.

Vulnerable Smartphone Data

One of the latest discoveries about smartphones revealed that a smartphone data is never deleted. It said, if you are selling a used smartphone and ensured that your data is deleted then you need to know that a smartphone data and records can be easily retrieved. The research and analysis was conducted by a Prague based security software firm Avast concluded this. During the study, the researchers were able to recover 40,000 plus personal photos, text messages, emails, messages and in some cases, were also able to identify the sellers.

“We bought various Google Android devices from sellers throughout the US and with the help of a readily available recovery software dig out personal data that existed on those devices previously,” said Jude McColgon, President – Mobiles at Avast. “The conclusion is that the deleted information from a used smartphone can be retrieved unless the users completely overwrite it,” he added. AVAST worked over 20 used smartphones whose earlier users performed a factory reset or processed delete-all operations on phones. In exact numbers, Avast researchers recovered 40,000 photos, 1,500 plus family photos, 1,000 plus Google searchers, 750 plus emails & text messages and 250 plus contact details, earlier existed on those devices.

Smartphone Second Screen

Another discovery around smartphones recently concluded that you can now add a second screen to your smartphones that has been developed by a US based firm to help you improve your phone’s battery life. The second screen named InkCase Plus, is a device in a form of screen mounted on a special case that will display incoming notifications and process special apps. This device comprises of a 3.5 inch display with a Bluetooth supporting feature and in-built battery that will offer 19 hours continuous power with screen time or up to 7 days standby time.

The InkCase Plus is developed by OAXIS. This device will help people personalize their smartphone case and also allow alerts to low power E Ink screen. With this, users can go through their notifications and read things without powering on to their main screen. Plus, InkCase Plus will provide reference materials like maps, tickets and shopping list, without powering on.

Insecurity of Smartphones

A latest research upon smartphone security concluded that world’s 90% smartphones from overall 2 billion plus devices are under risk with vulnerable password and data that can help hackers in accessing the device. One of the vulnerability combines the flaw due to the way manufactures of Google Android, Apple and BlackBerry devices have implemented an obscure industry standard which controls almost everything from the network connections to user identity.

The threat can facilitate hackers to remotely wipe devices, access data, install malicious software and run applications on smart devices. Plus, there’s another threat specifically affecting about 1/3 of devices having older Android version that also has been unveiled. This helps malicious apps to trick the trusted software of Adobe, Google and Android devices, without the need of user notification. Mainly, anything that depends on verified signature chains of Android apps is covered by this vulnerability.

Checkout latest IT news at

From ITvoir News Desk