Related topics: google

Security gaps identified in LTE mobile telephony standard

By abusing security weaknesses in the LTE mobile telephony standard, attackers are able to identify which web pages a user visits and to reroute him to a scam website. This is the result of a study carried out by security ...

Researchers discover security flaws in smart home products

Smart home products such as lamps controlled via mobile devices are becoming ever more popular in private households. We would, however, feel vulnerable in our own four walls if strangers suddenly started switching the lights ...

Hacking cybersecurity to anticipate attacks

Imagine two groups at war. One defends every attack as it comes. The other anticipates threats before they happen. Which is more likely to win?

page 3 from 18