The encryption scheme used for second generation (2G) mobile phone data can be hacked within seconds by exploiting weaknesses and using common hardware, A*STAR researches show. The ease of the attack shows an urgent need ...
Oct 21, 2016 in Security
With mobile phone use by drivers now a reality, a groundbreaking QUT review looking at the issue as a task-sharing problem has recommended further research into how to make the practice safer.
Oct 21, 2016 in Other