Security news

Weakness of 2G mobile phone networks revealed

The encryption scheme used for second generation (2G) mobile phone data can be hacked within seconds by exploiting weaknesses and using common hardware, A*STAR researches show. The ease of the attack shows an urgent need ...

date13 hours ago in Security
shares7 comments 0