Weakness of 2G mobile phone networks revealed

The encryption scheme used for second generation (2G) mobile phone data can be hacked within seconds by exploiting weaknesses and using common hardware, A*STAR researches show. The ease of the attack shows an urgent need ...

Encrypting medical photos with chaos

Chaos and confusion could be used to encrypt colour photos and protect them from prying eyes, according to computer scientists in Algeria. Writing in the International Journal of Information and Computer Security, the team ...

page 5 from 26