Weakness of 2G mobile phone networks revealed

The encryption scheme used for second generation (2G) mobile phone data can be hacked within seconds by exploiting weaknesses and using common hardware, A*STAR researches show. The ease of the attack shows an urgent need ...

Encrypting medical photos with chaos

Chaos and confusion could be used to encrypt colour photos and protect them from prying eyes, according to computer scientists in Algeria. Writing in the International Journal of Information and Computer Security, the team ...

Worried your emails might be spied on? Here's what you can do

We live in a post-Edward Snowden world, in which US tech companies have been accused of complicity in mass surveillance by the US National Security Agency (NSA). One recent allegation is the claim that Yahoo scanned hundreds ...

page 5 from 26