Related topics: mobile

Hacker drone launches airborne cyber attacks

Computer security specialists showed off a homemade drone aircraft Friday capable of launching airborne cyber attacks, hijacking mobile phone calls, or even delivering a dirty bomb.

Team discovers how mobile ads leak personal data

The personal information of millions of smartphone users is at risk due to in-app advertising that can leak potentially sensitive user information between ad networks and mobile app developers, according to a new study by ...

Researchers show how to use mobiles to spy on people

(PhysOrg.com) -- Researchers have demonstrated how it is possible to use GSM (Global System for Mobile communications) data along with a few tools to track down a person’s mobile phone number and their location, and even ...

Finland allocates new 4G mobile frequencies

The Finnish government said Friday it has allocated extra frequencies to telecom firms TeliaSonera, Elisa and DNA to run the country's new, faster fourth-generation (4G) mobile network.

Nokia sues Apple for patent infringement

Nokia announced Wednesday it is suing Apple in German and US courts for patent infringement, claiming the US tech giant was using Nokia technology in "many" products without paying for it.

Security gaps identified in LTE mobile telephony standard

By abusing security weaknesses in the LTE mobile telephony standard, attackers are able to identify which web pages a user visits and to reroute him to a scam website. This is the result of a study carried out by security ...

Explaining 5G wireless technology

If you take a stroll outside today, you'll see a lot of people with mobile phones, phablets or tablets in their hands making calls, using the internet to catch up on the news, watch videos, or interacting with others via ...

page 2 from 40