Security news

Weakness of 2G mobile phone networks revealed

The encryption scheme used for second generation (2G) mobile phone data can be hacked within seconds by exploiting weaknesses and using common hardware, A*STAR researches show. The ease of the attack shows an urgent need ...

dateOct 21, 2016 in Security
shares7 comments 0

What is the dark web and how does it work?

We often hear about the dark web being linked to terrorist plots, drug deals, knife sales and child pornography, but beyond this it can be hard to fully understand how the dark web works and what it looks like.

dateOct 20, 2016 in Security
shares1 comments 0

Creating 3-D hands to keep us safe, increase security

Creating a 3-D replica of someone's hand complete with all five fingerprints and breaking into a secure vault sounds like a plot from a James Bond movie. But Michigan State University Distinguished Professor Anil Jain recently ...

dateOct 20, 2016 in Security
shares0 comments 0