Calls via the LTE mobile network, also known as 4G, are encrypted and should therefore be tap-proof. However, researchers from Ruhr-Universität Bochum have shown that this is not always the case. They were able to decrypt the contents of telephone calls if they were in the same radio cell as their target, whose mobile phone they then called immediately following the call they wanted to intercept. They exploit a flaw that some manufacturers had made in implementing the base stations.
A new algorithm developed in the lab of Jr-Shin Li at the McKelvey School of Engineering at Washington University in St. Louis provides a framework for solving complex linear inverse problems that doesn't require a supercomputer and also enhances security and privacy.
Smart home technologies are marketed to enhance your home and make life easier. However, UK consumers are not convinced that they can trust the privacy and security of these technologies, a study by WMG, University of Warwick has shown.
According to their new study published in Computers & Security, the ability to launch massive distributed denial-of-service (DDoS) attacks via a botnet of compromised devices is an exponentially growing risk in the Internet of Things (IoT). Such massive attacks, possibly emerging from IoT devices in home networks, impact the attack target, as well as the infrastructure of telecommunication service providers (telcos).
Fake audio or video content has been ranked by experts as the most worrying use of artificial intelligence in terms of its potential applications for crime or terrorism, according to a new UCL report.
Using a quantum computer to simulate time travel, researchers have demonstrated that, in the quantum realm, there is no 'butterfly effect.' In the research, information--qubits, or quantum bits--'time travel' into the simulated past.
In a new paper, Cornell Tech researchers identified a problem that holds the key to whether all encryption can be broken -- as well as a surprising connection to a mathematical concept that aims to define and measure randomness.
One of the earliest studies to look at mass acceptance of tracing apps, undertaken by international researchers, including Lancaster University, suggests that privacy (which is generally prioritised by governments in terms of app design) is only the top consideration for a certain group of people. Others would place greater weighting on other considerations, such as how convenient it would be to use.
Researchers at TU Graz and AVL focus on software systems of autonomous driving systems. They developed a method for generating safety-critical simulation scenarios and an adaptive control procedure for compensating for internal errors.
A backstabbing crime boss and thousands of people looking for free tutorials on hacking and identity theft were two of the more interesting findings of a study examining user activity on two online 'carding forums,' illegal sites that specialize in stolen credit card information.