Guide to breaking cell phone security revealed

(AP) -- A German security expert has raised the ire of the cell phone industry after he and a group of researchers posted online a how-to guide for cracking the encryption that keeps the calls of GSM-standard cell phone users ...

GSM system about to be compromised

(PhysOrg.com) -- Research scientists in California and elsewhere are deliberately setting out to compromise the mobile phone system used by around three billion people. The system uses Global System for Mobile communications ...

Secure computers aren't so secure

(PhysOrg.com) -- Even well-defended computers can leak shocking amounts of private data. MIT researchers seek out exotic attacks in order to shut them down.

Report: China building cyberwarfare capabilities

(AP) -- China is building its cyberwarfare capabilities and appears to be using the growing technical abilities to collect U.S. intelligence through a sophisticated and long-term computer attack campaign, according to an ...

New digital security program doesn't protect as promised

(PhysOrg.com) -- University of Texas at Austin scientists have shown that they can break "Vanish," a program that promised to self-destruct computer data, such as emails and photographs, and thereby protect a person's privacy.

First-ever calculation performed on optical quantum computer chip

(PhysOrg.com) -- A primitive quantum computer that uses single particles of light (photons) whizzing through a silicon chip has performed its first mathematical calculation. This is the first time a calculation has been performed ...

page 25 from 26